Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-28327
Vulnerability from cvelistv5
Published
2022-04-20 00:00
Modified
2024-08-03 05:48
Severity ?
EPSS score ?
Summary
The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:48:38.092Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" }, { "name": "FEDORA-2022-a49babed75", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/" }, { "name": "FEDORA-2022-53f0c619c5", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NY6GEAJMNKKMU5H46QO4D7D6A24KSPXE/" }, { "name": "FEDORA-2022-c0f780ecf1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/" }, { "name": "FEDORA-2022-e46e6e8317", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/" }, { "name": "FEDORA-2022-fae3ecee19", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/" }, { "name": "FEDORA-2022-ba365d3703", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "FEDORA-2022-30c5ed5625", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220915-0010/" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-14T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://groups.google.com/g/golang-announce" }, { "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" }, { "name": "FEDORA-2022-a49babed75", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/" }, { "name": "FEDORA-2022-53f0c619c5", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NY6GEAJMNKKMU5H46QO4D7D6A24KSPXE/" }, { "name": "FEDORA-2022-c0f780ecf1", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/" }, { "name": "FEDORA-2022-e46e6e8317", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/" }, { "name": "FEDORA-2022-fae3ecee19", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/" }, { "name": "FEDORA-2022-ba365d3703", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/" }, { "name": "GLSA-202208-02", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "FEDORA-2022-30c5ed5625", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/" }, { "url": "https://security.netapp.com/advisory/ntap-20220915-0010/" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-28327", "datePublished": "2022-04-20T00:00:00", "dateReserved": "2022-04-01T00:00:00", "dateUpdated": "2024-08-03T05:48:38.092Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-28327\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-04-20T10:15:08.030\",\"lastModified\":\"2024-11-21T06:57:10.200\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.\"},{\"lang\":\"es\",\"value\":\"La caracter\u00edstica gen\u00e9rica P-256 en crypto/elliptic en Go versiones anteriores a 1.17.9 y versiones 1.18.x anteriores a 1.18.1, permite un p\u00e1nico por medio de una entrada escalar larga\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.17.9\",\"matchCriteriaId\":\"2437ADD6-8C18-49F6-BF6A-EEBE68F66031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.18.0\",\"versionEndExcluding\":\"1.18.1\",\"matchCriteriaId\":\"F786A4EC-4A24-4216-8F24-3BD4091BE741\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D9C7598-4BB4-442A-86DF-EEDE041A4CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB176AC3-3CDA-4DDA-9089-C67B2F73AA62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}],\"references\":[{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://groups.google.com/g/golang-announce\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/oecdBNLOml8\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NY6GEAJMNKKMU5H46QO4D7D6A24KSPXE/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220915-0010/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://groups.google.com/g/golang-announce\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/oecdBNLOml8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NY6GEAJMNKKMU5H46QO4D7D6A24KSPXE/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20220915-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2022_6277
Vulnerability from csaf_redhat
Published
2022-08-31 16:58
Modified
2024-12-18 00:35
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.5 security update
Notes
Topic
Red Hat OpenShift Service Mesh 2.1.5
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* moment: Moment.js: Path traversal in moment.locale (CVE-2022-24785)
* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 2.1.5\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* moment: Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6277", "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6277.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.5 security update", "tracking": { "current_release_date": "2024-12-18T00:35:31+00:00", "generator": { "date": "2024-12-18T00:35:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6277", "initial_release_date": "2022-08-31T16:58:21+00:00", "revision_history": [ { "date": "2022-08-31T16:58:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-31T16:58:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.1", "product": { "name": "OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.src", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.src", "product_id": "servicemesh-operator-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-0:2.1.5-1.el8.src", "product_id": "servicemesh-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.src", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.src", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=src" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.5-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=x86_64" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.5-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debugsource@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-debuginfo@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-operator-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-operator-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-operator-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-operator@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-cni-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-cni-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-cni-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-cni@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-agent@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-pilot-discovery@2.1.5-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "product": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "product_id": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-prometheus@2.23.0-9.el8?arch=s390x" } } }, { "category": "product_version", "name": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "product": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "product_id": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-ratelimit@2.1.5-1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "product": { "name": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "product_id": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/servicemesh-proxy-wasm@2.1.5-1.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-cni-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-cni-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-cni-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-cni-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-operator-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-operator-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" }, "product_reference": "servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-proxy-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" }, "product_reference": "servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.src as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.src", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" }, "product_reference": "servicemesh-ratelimit-0:2.1.5-1.el8.x86_64", "relates_to_product_reference": "8Base-OSSM-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "known_not_affected": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-31T16:58:21+00:00", "details": "The OpenShift Service Mesh Release Notes provide information on the features and known issues:\n\nhttps://docs.openshift.com/container-platform/latest/service_mesh/v2x/servicemesh-release-notes.html", "product_ids": [ "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6277" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-cni-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-operator-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-agent-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-pilot-discovery-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.s390x", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.src", "8Base-OSSM-2.1:servicemesh-prometheus-0:2.23.0-9.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-proxy-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debuginfo-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-proxy-debugsource-0:2.1.5-1.el8.x86_64", "8Base-OSSM-2.1:servicemesh-proxy-wasm-0:2.1.5-1.el8.noarch", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.ppc64le", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.s390x", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.src", "8Base-OSSM-2.1:servicemesh-ratelimit-0:2.1.5-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_6040
Vulnerability from csaf_redhat
Published
2022-08-10 13:13
Modified
2024-12-17 22:00
Summary
Red Hat Security Advisory: Release of OpenShift Serverless 1.24.0
Notes
Topic
Release of OpenShift Serverless 1.24.0
The References section contains CVE links providing detailed severity ratings
for each vulnerability. Ratings are based on a Common Vulnerability Scoring
System (CVSS) base score.
Details
Version 1.24.0 of the OpenShift Serverless Operator is supported on Red Hat
OpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, 4.10, and 4.11.
This release includes security and bug fixes, and enhancements.
Security Fixes in this release include:
- prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
- go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)
- golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
- golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
- golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
- golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
- golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
- golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
- golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
- golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
- golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
- golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
- golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issues, including the impact; a CVSS score;
acknowledgments; and other related information refer to the CVE pages linked in
the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless 1.24.0\n\nThe References section contains CVE links providing detailed severity ratings\nfor each vulnerability. Ratings are based on a Common Vulnerability Scoring\nSystem (CVSS) base score.", "title": "Topic" }, { "category": "general", "text": "Version 1.24.0 of the OpenShift Serverless Operator is supported on Red Hat\nOpenShift Container Platform versions 4.6, 4.7, 4.8, 4.9, 4.10, and 4.11. \n\nThis release includes security and bug fixes, and enhancements.\n\nSecurity Fixes in this release include:\n- prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n- go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)\n- golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n- golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n- golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\n- golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n- golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n- golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n- golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n- golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n- golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n- golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n- golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issues, including the impact; a CVSS score;\nacknowledgments; and other related information refer to the CVE pages linked in\nthe References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6040", "url": "https://access.redhat.com/errata/RHSA-2022:6040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2094982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094982" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6040.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless 1.24.0", "tracking": { "current_release_date": "2024-12-17T22:00:33+00:00", "generator": { "date": "2024-12-17T22:00:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6040", "initial_release_date": "2022-08-10T13:13:24+00:00", "revision_history": [ { "date": "2022-08-10T13:13:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-10T13:13:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:00:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.24", "product": { "name": "Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.24::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=1.3.1-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "product_id": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-controller-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "product_id": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "product_id": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-post-install-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "product_id": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-webhook-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=1.3.1-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.24.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=1.3.0-3" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=1.3.1-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "product_id": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-controller-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "product_id": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "product_id": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-post-install-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "product_id": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-webhook-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=1.3.1-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.24.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548?arch=s390x\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=1.3.0-3" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "product": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "product_id": "openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "product_identification_helper": { "purl": "pkg:oci/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/client-kn-rhel8\u0026tag=1.3.1-4" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "product": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "product_id": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "product": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "product_id": "openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "product": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "product_id": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "product_id": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-controller-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "product_id": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "product_id": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-post-install-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "product": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "product_id": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "product": { "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "product_id": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-kafka-broker-webhook-rhel8\u0026tag=1.3.2-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-filter-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "product": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "product_id": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtbroker-ingress-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "product": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "product_id": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtchannel-broker-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "product": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "product_id": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-mtping-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "product": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "product_id": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-storage-version-migration-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "product": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "product_id": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-sugar-controller-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "product": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "product_id": "openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "product_identification_helper": { "purl": "pkg:oci/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/eventing-webhook-rhel8\u0026tag=1.3.2-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "product": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "product_id": "openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "product_identification_helper": { "purl": "pkg:oci/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/ingress-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "product": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "product_id": "openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "product_identification_helper": { "purl": "pkg:oci/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/knative-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "product": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "product_id": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "product_identification_helper": { "purl": "pkg:oci/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kn-cli-artifacts-rhel8\u0026tag=1.3.1-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "product": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "product_id": "openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "product_identification_helper": { "purl": "pkg:oci/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/kourier-control-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64", "product": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64", "product_id": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64", "product_identification_helper": { "purl": "pkg:oci/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/svls-must-gather-rhel8\u0026tag=1.24.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "product": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "product_id": "openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-controller-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "product": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "product_id": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "product_identification_helper": { "purl": "pkg:oci/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/net-istio-webhook-rhel8\u0026tag=1.3.0-2" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "product": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "product_id": "openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-operator-bundle\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "product": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "product_id": "openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "product_identification_helper": { "purl": "pkg:oci/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serverless-rhel8-operator\u0026tag=1.24.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "product": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "product_id": "openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-activator-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-hpa-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "product": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "product_id": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-autoscaler-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "product": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "product_id": "openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-controller-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "product": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "product_id": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-domain-mapping-webhook-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "product": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "product_id": "openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-queue-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "product": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "product_id": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-storage-version-migration-rhel8\u0026tag=1.3.0-3" } } }, { "category": "product_version", "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "product": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "product_id": "openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "product_identification_helper": { "purl": "pkg:oci/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934?arch=amd64\u0026repository_url=registry.redhat.io/openshift-serverless-1/serving-webhook-rhel8\u0026tag=1.3.0-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64" }, "product_reference": "openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x" }, "product_reference": "openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64" }, "product_reference": "openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64" }, "product_reference": "openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64" }, "product_reference": "openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x" }, "product_reference": "openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64" }, "product_reference": "openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le" }, "product_reference": "openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x" }, "product_reference": "openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64" }, "product_reference": "openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64" }, "product_reference": "openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x" }, "product_reference": "openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64" }, "product_reference": "openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le" }, "product_reference": "openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64" }, "product_reference": "openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x" }, "product_reference": "openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le" }, "product_reference": "openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le" }, "product_reference": "openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x" }, "product_reference": "openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le" }, "product_reference": "openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64" }, "product_reference": "openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le" }, "product_reference": "openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le" }, "product_reference": "openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64 as a component of Red Hat OpenShift Serverless 1.24", "product_id": "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" }, "product_reference": "openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64", "relates_to_product_reference": "8Base-Openshift-Serverless-1.24" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "cve": "CVE-2022-1996", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094982" } ], "notes": [ { "category": "description", "text": "A flaw was found in CORS Filter feature from the go-restful package. When a user inputs a domain which is in AllowedDomains, all domains starting with the same pattern are accepted. This issue could allow an attacker to break the CORS policy by allowing any page to make requests and retrieve data on behalf of users.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-restful: Authorization Bypass Through User-Controlled Key", "title": "Vulnerability summary" }, { "category": "other", "text": "The go-restful package is a transitive dependency which is being pulled with k8s.io/api and not directly being used anywhere in OpenShift Container Platform (OCP), OpenShift Container Storage, OpenShift Data Foundation, OpenShift Do and OpenShift Pipelines, hence these components are marked as \u0027Will not fix\u0027 or even \"Not affected\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1996" }, { "category": "external", "summary": "RHBZ#2094982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094982" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1996", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1996" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1996", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1996" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "go-restful: Authorization Bypass Through User-Controlled Key" }, { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T13:13:24+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6040" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:4dc0783cf92da5b5aa4cd1b9e9d55aa55a69b94eef0d29f261d3d51bd2260b68_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:80fd78ad61caab0b20e39d4c6103ed9b074d3efa1dc67ab7bf415ea7db912dc3_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-receiver-rhel8@sha256:aeaaf1d541b5756df65f0700bcd82d085077ae3b1ce99c6d8728997c23e31ef9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1-tech-preview/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:09644d1c149970cd7c06635806a0ffc077a6340d68c357cd7f2bb5a6f57e46f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:46510d8b5dfba62d0a3da64ba90d1b8f88ad3b909c3e6ed14bcd96017d766829_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/client-kn-rhel8@sha256:f9bf2892123c3d981d2d5f158e643e6ba6f59a441b47c4055dc542f8cf8330c0_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:834e37f8ddfbe157ad357fcef49f5213053d1295bb31361c5dd14a213ff2755c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:d13848369ca942d13548ab9b73a2d60b67f9412e535ed647342acaa8cef36c37_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-apiserver-receive-adapter-rhel8@sha256:eef2145e61234d37713ef8fda1f82d7cbe6502c5e6386117230d66ab7e1dd21a_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:52ef0c51b53ede0344f58174e624db08e6dcac04a0cba1668915f217949fc868_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:72c5fcaa44e3da56b297eb718d8a2b7eeb44069d6f3ce71b0eca30070b18bd9d_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-controller-rhel8@sha256:ad2df12dd77e8a3092431ca8d1b5eae42240c8ebb8766e436009bd6df7ee51f3_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:070f2c819506853dee230f37e00b27a05ba01c6f7cbbffc9a04b59a65d0c45e9_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:111da99563ea799e6b54933f12dc8f8a3828e36f650900e02da3be5afbdeefd9_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-controller-rhel8@sha256:69871b8d6e72713fe2eaf5f1e0aac1282fb8659d2895836994f10c847fe320d1_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:4b5ee83ccace988c6eaf456e82dea83d160ae7e6aaad1ab8f48410f90da8f1c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:52247eff5dc9a89244e6697ae9ce61cc1b42265171c956d4d50984179daced89_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-in-memory-channel-dispatcher-rhel8@sha256:68b61474089703d0685a952062401303206ba11bc108b8504f6f6390933d83cb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:2a4b30bcff1377073202362dfd521bd7ac3e3e3960fdb33a6cf9fa39fc89de6b_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:be290e6d950e8af6162c1dece8472788b66459e8cb91df319f50ccf66f27b5c7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-controller-rhel8@sha256:f8b5d9c9c0182f5cc1f76422759bf8925d2f29292390ada83a6b7c7986f1462c_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:08c6d6908a2e58a18e908223daf152802106b00a67905e94e075fca827af87c9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:8ac0796f3585a406facba98766688ae6777b5673a4515418db8d1d92c4d65494_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-dispatcher-rhel8@sha256:9af6b8413acbf59adc88e9b88a51105f3b0a4913499c3026f64e7fda91e43384_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:260e7f0086f4e036be3a9ab5d24ce99fc8a053cc7f2906f8a6080f59f2a3e591_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:36551ea609536ba900f7a0493a06d07f9c0f19a0eef7e4956575354ca92cd1ef_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-post-install-rhel8@sha256:6d4a898f37f87aa6db636487c6892833249be38635fe631433652feda762a40e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:0dad9dc28babb21622f90c83647c9cc48bfa66faad257c88e7adf1d50ad0f80c_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:10ba81e103ed6b7dff7b02394b20f44b46acd6b09d72f16667c068eb9989dc77_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-kafka-broker-webhook-rhel8@sha256:f94aef78ce0870fdceac5b3467220540127a73415e81baa4b48bf986bc181c4d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:4f6e162ee5fb96ff69a1546b7f728641dded59548f14afdfa870f7f0291787ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ecde2ee2aa9618775178e03bcc07e53d6f5e12f30261238d8ffb366fb1e47c94_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-filter-rhel8@sha256:ee2dc3e0f648dc59551cfdf0ac5c36aa6cd9a4b2abaada7095ae4d5b8e0a571e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:4eaac6386b1b8a9e360df5afbd85aeebb97e5c81dbd861996caafad48b4cc6f9_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:644fbcd1924d570f105f5f9760eb15eddbeed16c894edfcb4ef8c8a14e370bce_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtbroker-ingress-rhel8@sha256:a26dfc1a610bbaf876443b4b01a04130f7c0aba4d40e246333fe8bf7eb899f45_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:353859f2a8649fa9b3f5c0e02cafd57f79f96a10a7a697ba08eaa8cb70effe51_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:6f7afb57dc78ccb13498434196c5e8cd0f6ec53f045689febf1a62c492358d93_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtchannel-broker-rhel8@sha256:fadf3035a8bd25307843d1c6c88654a03db25983407a770875b4507942684dd5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:2254577d2c2e67d28f8459fbd4ac43af78b7d29cc0b56c631607dd68f3d31637_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:a7177a43f46b6470a19970c62ebc17119ca3c3021471f9396faa436e621beb1e_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-mtping-rhel8@sha256:c6c2c7924d90e81e2906f3bf3969b02d7f3e4dc80c187e6c55a7e4ea17ac20cd_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:3c1baa5bad644c06bedabaed9c668f0999527f00bc1d195e71a528c222087328_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:63dab761fd3a2e08950b7ee52852fb39cef7820f2a8cf8142ec3701a07372d7c_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-storage-version-migration-rhel8@sha256:ff7924a37865ac1a90872f35675934a1627e49a29577a78af18b8e743a5fde07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:24c7217a3612a5c3c6792c433dc2a6cf4b5fda1b9e6acff84e2736705704d152_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:3a38788638c26e9bec45694b2c4597333080189ffa96d8c7302e3e7dd1e54be5_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-sugar-controller-rhel8@sha256:aebfba016342e94fc0619a9ad6346c7fefbedf6739f1495954eb905cade085ac_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:11d0b8fac4cb67c95e051a91f5c6683768f8969ffc744cd3cc4814d1ee6e91c1_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:1b209d1ddffba92c3d77824e37bf75302346856c10b773a101d2868f27d0b740_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/eventing-webhook-rhel8@sha256:bf8c9de32dd5cbe536b115f52f32c666fbf886bde555ac355937d6b149cf9343_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:46a5fb2d0f9fa5e05504b9264a3f1c0e7c7beb76e3a3aeb9bc036cda4fa9d66a_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:793b86f4c2add102e2f676bd57cec3365ce9b3fdc40a989c28d1f9acb851142d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/ingress-rhel8-operator@sha256:cce79392f93bb318123c48ac6de48aa0a2983cc1134cc063c0fdc2ff83c546c7_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:1a51a072d4e303a5c33b2383c843308d86c68de228b094d2efed8bc59a4bac14_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:c61b26bdf318b507af66f9092e784d64436e3b2531cc6e2e8aa1bb8bbb010fb7_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kn-cli-artifacts-rhel8@sha256:f22168224137db649c6e6592e3ec2ae6845ca668ef65fe56c104ed6393eae526_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:53e115cdfeb8077cc8b89ebdeee4903b1be8c0a0d45831a9f277f342959f5961_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:ebf24097b84ec5773e30c8f548975afb84b6fce836b373b97855f69371068d1e_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/knative-rhel8-operator@sha256:efa444ca6c7c4468821a8d138b4319c86fede592f3b0b4d7905e7c66e8bdb2c0_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:396fb9dcc798b05e89d38ccbe3a3abb31854f56a95ae104fb9bb215967b56d9f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:e36577c37457a4521d78f28f24dca6ae11f170635316efe374f08f825cb5904d_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/kourier-control-rhel8@sha256:fb04b74dce262e58434b19a10dce0981b4df7541416de21343fb7124c714ffbf_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:281b2782253722d916b6178ecdbc763aaa71ed4ac0db94e31d57974d4eb8b58b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:bf56038c0af2cfeb5a3e4b7ecd5aeebb230d042ac835b50faafa3d939dd8ca50_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-controller-rhel8@sha256:f3643c74f73841b1de04be1d0f550c044f1ad4800ceb32cb36bf9072d8e5155b_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:4f7cabd5a6bb6fd7a0d81461108891b0d2de55efe868c4fbf275131c3280ed2d_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:a07d73f5c04af2a29b6565363b472aceabbfeafe7d6dfe833d1e71b072419916_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/net-istio-webhook-rhel8@sha256:cd34685812d9447969a1c3fb4382433a1b59fb3631fbe156daa6fa962458f859_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-operator-bundle@sha256:0422f8843fc62c2b72e01ffefd33db912a1ad3d70ac297882d3663c9b7299f10_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:26d940bd43b928d8370c9e88e80726a427c3f0ce3afc4fddb02a507f81c8fc93_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:2898df30f40683bd3a73c6f2676afdc1bfc27b23d2fe04fe7667f6db6d2422ab_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serverless-rhel8-operator@sha256:8ec9e756969c8e6bf8155ed102a66cf578a325dcc477ff909b4806405ab59cfc_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:1e9fb289564961ddbf317e568c50936b048446685c39ab14ca4e5cb682785243_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:3a823819467ed0beea953eed27e2129bb4495df3f49e0f59d5004dee416e6285_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-activator-rhel8@sha256:4e7563e5f9761f624aefc6b79845e5b4dd1836a545c3754bc37701162ed4e3bb_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:1685c7bf25061e61688d2b5e60cde6adb8906fec6bfb713c68837b2bbeeacf85_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:491df16728df492b7b88efb8e86f28e46a8762f4084fb4132823611a9e758264_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-hpa-rhel8@sha256:8bb514634ece7dafd88ae6cc7eff52016cd4585d91cb9c106720c21c219f8967_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:01b46e0ddb618f58c06b533fe7148f772367200f5d9be9d355012e91dc401156_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:8cd0a381de995467f339e11f0704b8c8b978ddfdd2d8271f4c9f832e7acf9f07_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-autoscaler-rhel8@sha256:c60796d720141d322159e49bb3496732b8e0453d6606227b419caf93a12d196b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:92b01a8421488e9d9b42b6da290873b54a2619d39a05e8d2a99e4c5348a3d4dc_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b5ae691a77adb161a30ae8470f1cf4c1c6259488df18bb2bf2764d05af9a2aa8_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-controller-rhel8@sha256:b752a295b673aeee85eba6bed33cc658254dc0503c6002841d80dc0c0a38f615_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:11bca084f2c8df8d369d6301847876bbf8d37c7b67a6ffb387e0759100b6e817_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:4e580d29cbff1aa6050c65cee35a870dab9e6a7eaa538b356a5afefed9c38d90_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-rhel8@sha256:eeb39a3fbc9d4c223d42579737948438d03b2a2ec1aee46562aabae6d343679b_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:8057fa6657c0bf909297273acc4faea1cddb29f9f02f6c797279adb42f083332_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:84e13a4c84098e0a6a5b461c7581861cd9114ce3cc7c2147afd727e56f323b28_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-domain-mapping-webhook-rhel8@sha256:f99e203de17686584c05ee0901041edd055350c39da063d5d6dcd026d1e17593_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:8740a1f7cb3ef3c4caa5774cced7787cc1e345dbe3708307001c1def9fd32e2f_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:ac1ca0ae5e3c7fc242ec5a313e45d09b83261ffe26eab3ebcbbae9299471b25a_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-queue-rhel8@sha256:f16b4f4e86e758354c8b19ee3a075dfd6fd19eb7ba282ad8293d41ca0c8f3028_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:1c3b2c4c06981fd8eb13c05837c8da3523f0df9c79eacd6ffc1138e5f26bdba6_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:27b7b75eae9eacc52a577887885db7c29192e15aada8a3b7406e032561609462_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-storage-version-migration-rhel8@sha256:8012cc60fab4e14b7fab05589c977c15ac941efb09601069be09d4e25385ed26_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:4fdc2c632eb0fa4f10a78e39622c83febde93f38db16bd0ca4a35c1eb7062548_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:6904376f1ae4dadc23ab9993b50aaaa3db130fcd338f3dfae9e437b348e6e934_amd64", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/serving-webhook-rhel8@sha256:dc902a39bc520abcf2100c26e2e1c4ba20aa5aadff763b40f234eb01a26b6f77_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:057e9ccae9eae50fadad4772b203e897f5c54bf9d40f6e2f2ccbdbc93f5850b5_ppc64le", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:7557328dcdede1992a3660342f037e490f58bc3281c68c6e4f44e6d66c4a0cff_s390x", "8Base-Openshift-Serverless-1.24:openshift-serverless-1/svls-must-gather-rhel8@sha256:e0a982cd04fee4416659b7e1e6a827c2c371144bd461f23913ae9e0633fd598a_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" } ] }
rhsa-2022_5840
Vulnerability from csaf_redhat
Published
2022-08-02 07:44
Modified
2024-12-17 21:59
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update
Notes
Topic
The Migration Toolkit for Containers (MTC) 1.7.3 is now available.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security Fix(es):
* cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-1365)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Velero and Restic are using incorrect SCCs [OADP-BL] (BZ#2082216)
* [MTC] Migrations gets stuck at StageBackup stage for indirect runs [OADP-BL] (BZ#2091965)
* MTC: 1.7.1 on OCP 4.6: UI is stuck in "Discovering persistent volumes attached to source projects" step (BZ#2099856)
* Correct DNS validation for destination namespace (BZ#2102231)
* Deselecting all pvcs from UI still results in an attempted PVC transfer (BZ#2106073)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Migration Toolkit for Containers (MTC) 1.7.3 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es):\n\n* cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-1365)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Velero and Restic are using incorrect SCCs [OADP-BL] (BZ#2082216)\n\n* [MTC] Migrations gets stuck at StageBackup stage for indirect runs [OADP-BL] (BZ#2091965)\n\n* MTC: 1.7.1 on OCP 4.6: UI is stuck in \"Discovering persistent volumes attached to source projects\" step (BZ#2099856)\n\n* Correct DNS validation for destination namespace (BZ#2102231)\n\n* Deselecting all pvcs from UI still results in an attempted PVC transfer (BZ#2106073)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5840", "url": "https://access.redhat.com/errata/RHSA-2022:5840" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2076133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076133" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2082216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082216" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2091965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091965" }, { "category": "external", "summary": "2099856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099856" }, { "category": "external", "summary": "2102231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102231" }, { "category": "external", "summary": "2106073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106073" }, { "category": "external", "summary": "MIG-1155", "url": "https://issues.redhat.com/browse/MIG-1155" }, { "category": "external", "summary": "MIG-1242", "url": "https://issues.redhat.com/browse/MIG-1242" }, { "category": "external", "summary": "MIG-1254", "url": "https://issues.redhat.com/browse/MIG-1254" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5840.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.3 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T21:59:21+00:00", "generator": { "date": "2024-12-17T21:59:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5840", "initial_release_date": "2022-08-02T07:44:20+00:00", "revision_history": [ { "date": "2022-08-02T07:44:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-02T07:44:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:59:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.7", "product": { "name": "8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.7::el8" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "product": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.7.3-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "product": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "product": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.7.3-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.7.3-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.7.3-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "product": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "product": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.7.3-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64", "product": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64", "product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.7.3-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64" }, "product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64" }, "product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64" }, "product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" }, "product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1365", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-04-18T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2076133" } ], "notes": [ { "category": "description", "text": "A flaw was found in the cross-fetch library when fetching a remote URL with a cookie when it gets to the Location response header. This flaw allows an attacker to hijack the account as the cookie is leaked.", "title": "Vulnerability description" }, { "category": "summary", "text": "cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1365" }, { "category": "external", "summary": "RHBZ#2076133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1365" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1365", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1365" }, { "category": "external", "summary": "https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac/", "url": "https://huntr.dev/bounties/ab55dfdd-2a60-437a-a832-e3efe3d264ac/" } ], "release_date": "2022-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-02T07:44:20+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-02T07:44:20+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-02T07:44:20+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-02T07:44:20+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5840" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:03e0f38c3322c9e0f96d437ab0b7f179ad7fe6b98b3bb48c8b05ccd0e5965a5e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:ebfe5e46136403487d93b86ea8e3b45dd41a23bc2832f3ada395f68325b4144d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:c4c002370992e78296dc8df029b58a14de21df148f1b786879e40c7b26f55d2a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:dcc13d7a3b2568686efd69c3c6c8f97f35fae4e496215ff3e8f941cb857ba6c2_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:ab6adb9b97054f77cd4c6a7a2779b9a460e4522811a8085f369cca874e952773_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:30464ddc47f4f0120b09d2743c67bfa334e0492e425bdc56ebe8995dc445c641_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:0588cd80458af20cb948ad6c94cace6b20f1efe6d6c0302edc93875394942739_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:bf4be4d55717beabd34677fcd524d923bce884b31858cc799b3cd4de6517568f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:6c329908061f6d9d64f42df3d56698768d6cdd4317488fde384d02246da94cce_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:dc2c127370075f766800b87ad15e0e9f93ebf1363c4c6290e22980b3886c01b8_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:8a0c0152a14de141be1dd68e1470dd3d48e6acab594c80464429825f76eafffb_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:a6f0fc1c0439e0275df3fdf48286e43a1ae64926fe2ef3e5e20e6db0b28fc131_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:d2157b916648e7dbbf02ae053c1ff5c87828a6ea23f496932ef49999a6ea906a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:0219496435c302abb17fb7edb31f272dea5a7fb60682299cd06e561bc5ff92df_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:add80d664c2b13f724e19e918bcfd3ce271624960d61745ae835fef65aa56661_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:9dacf917da6b6230f6b32b7104b08fddf3ee53bf71cf4bc595dd56e0085d84cf_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" } ] }
rhsa-2022_6094
Vulnerability from csaf_redhat
Published
2022-08-23 18:15
Modified
2024-12-17 22:00
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.10.28 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.10.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.28. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHBA-2022:6095
Security Fix(es):
* golang: cmd/go: misinterpretation of branch names can lead to incorrect
access control (CVE-2022-23773)
* golang: crypto/elliptic: IsOnCurve returns true for invalid field
elements (CVE-2022-23806)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: crypto/elliptic: panic caused by oversized scalar
(CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.
All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.10.28 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.10.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.28. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHBA-2022:6095\n\nSecurity Fix(es):\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect\naccess control (CVE-2022-23773)\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field\nelements (CVE-2022-23806)\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* golang: crypto/elliptic: panic caused by oversized scalar\n(CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s)\nlisted in the References section.\n\nAll OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6094", "url": "https://access.redhat.com/errata/RHSA-2022:6094" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6094.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.10.28 packages and security update", "tracking": { "current_release_date": "2024-12-17T22:00:47+00:00", "generator": { "date": "2024-12-17T22:00:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6094", "initial_release_date": "2022-08-23T18:15:46+00:00", "revision_history": [ { "date": "2022-08-23T18:15:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-23T18:15:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:00:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "NetworkManager-1:1.30.0-16.el8_4.src", "product": { "name": "NetworkManager-1:1.30.0-16.el8_4.src", "product_id": "NetworkManager-1:1.30.0-16.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.30.0-16.el8_4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "product": { "name": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "product_id": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.4-1.rhaos4.10.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "product": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "product_id": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "product": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "product_id": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "product": { "name": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "product_id": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-13.rhaos4.10.git6af791c.1.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "NetworkManager-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_id": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.30.0-16.el8_4?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product_id": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product_id": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product_id": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "NetworkManager-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_id": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.30.0-16.el8_4?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product_id": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "NetworkManager-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_id": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.30.0-16.el8_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product_id": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product_id": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "product": { "name": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "product_id": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-13.rhaos4.10.git6af791c.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-13.rhaos4.10.git6af791c.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "NetworkManager-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-devel@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-team-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debugsource@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-adsl-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-bluetooth-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-cloud-setup-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-libnm-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ovs-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-ppp-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-team-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-tui-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wifi-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "product": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "product_id": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-wwan-debuginfo@1.30.0-16.el8_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product_id": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product_id": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product_id": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-14.rhaos4.10.git6af791c.1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "product": { "name": "NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "product_id": "NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-config-connectivity-redhat@1.30.0-16.el8_4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "product": { "name": "NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "product_id": "NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-config-server@1.30.0-16.el8_4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "product": { "name": "NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "product_id": "NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/NetworkManager-dispatcher-routing-rules@1.30.0-16.el8_4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "product": { "name": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "product_id": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.4-1.rhaos4.10.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "product": { "name": "console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "product_id": "console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.20.4-1.rhaos4.10.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "product": { "name": "console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "product_id": "console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.20.4-1.rhaos4.10.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "product_id": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "product_id": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src" }, "product_reference": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64" }, "product_reference": "cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.30.0-16.el8_4.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src" }, "product_reference": "NetworkManager-1:1.30.0-16.el8_4.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch" }, "product_reference": "NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-config-server-1:1.30.0-16.el8_4.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch" }, "product_reference": "NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch" }, "product_reference": "NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-team-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64" }, "product_reference": "NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch" }, "product_reference": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src" }, "product_reference": "console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch" }, "product_reference": "console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch" }, "product_reference": "console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64" }, "product_reference": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le" }, "product_reference": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x" }, "product_reference": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src" }, "product_reference": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" }, "product_reference": "cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64" }, "product_reference": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64" }, "product_reference": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src" }, "product_reference": "openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-23T18:15:46+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-23T18:15:46+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-23T18:15:46+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-23T18:15:46+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6094" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-13.rhaos4.10.git6af791c.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.src", "8Base-RHOSE-4.10:NetworkManager-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-adsl-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-bluetooth-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-cloud-setup-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-config-connectivity-redhat-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-config-server-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-debugsource-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-dispatcher-routing-rules-1:1.30.0-16.el8_4.noarch", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-libnm-devel-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ovs-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-ppp-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-team-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-tui-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wifi-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.aarch64", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.ppc64le", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.s390x", "8Base-RHOSE-4.10:NetworkManager-wwan-debuginfo-1:1.30.0-16.el8_4.x86_64", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-0:0.20.4-1.rhaos4.10.el8.src", "8Base-RHOSE-4.10:console-login-helper-messages-issuegen-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:console-login-helper-messages-profile-0:0.20.4-1.rhaos4.10.el8.noarch", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-14.rhaos4.10.git6af791c.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202208150436.p0.gb1f6fe3.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" } ] }
rhsa-2023_3664
Vulnerability from csaf_redhat
Published
2023-06-19 10:32
Modified
2024-12-17 22:21
Summary
Red Hat Security Advisory: OpenShift Jenkins image and Jenkins agent base image security update
Notes
Topic
Release of Bug Advisories for the OpenShift Jenkins image and Jenkins agent base image.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Release of Security Advisory for the OpenShift Jenkins image and Jenkins agent base image.
Security Fix(es):
* golang: net/http: An attacker can cause excessive memory growth in a Go
server accepting HTTP/2 requests (CVE-2022-41717)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of Bug Advisories for the OpenShift Jenkins image and Jenkins agent base image.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Release of Security Advisory for the OpenShift Jenkins image and Jenkins agent base image.\n\nSecurity Fix(es):\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go\nserver accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3664", "url": "https://access.redhat.com/errata/RHSA-2023:3664" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "OCPBUGS-11182", "url": "https://issues.redhat.com/browse/OCPBUGS-11182" }, { "category": "external", "summary": "OCPBUGS-13653", "url": "https://issues.redhat.com/browse/OCPBUGS-13653" }, { "category": "external", "summary": "OCPBUGS-14114", "url": "https://issues.redhat.com/browse/OCPBUGS-14114" }, { "category": "external", "summary": "OCPBUGS-1438", "url": "https://issues.redhat.com/browse/OCPBUGS-1438" }, { "category": "external", "summary": "OCPBUGS-14646", "url": "https://issues.redhat.com/browse/OCPBUGS-14646" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3664.json" } ], "title": "Red Hat Security Advisory: OpenShift Jenkins image and Jenkins agent base image security update", "tracking": { "current_release_date": "2024-12-17T22:21:35+00:00", "generator": { "date": "2024-12-17T22:21:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3664", "initial_release_date": "2023-06-19T10:32:56+00:00", "revision_history": [ { "date": "2023-06-19T10:32:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-06-19T10:32:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:21:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product": { "name": "OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:ocp_tools:4.11::el8" } } } ], "category": "product_family", "name": "OpenShift Jenkins" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "product": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "product_id": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "product_identification_helper": { "purl": "pkg:oci/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8\u0026tag=v4.11.0-1686831582" } } }, { "category": "product_version", "name": "ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64", "product": { "name": "ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64", "product_id": "ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64", "product_identification_helper": { "purl": "pkg:oci/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-rhel8\u0026tag=v4.11.0-1686832830" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "product": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "product_id": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "product_identification_helper": { "purl": "pkg:oci/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8\u0026tag=v4.11.0-1686831582" } } }, { "category": "product_version", "name": "ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "product": { "name": "ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "product_id": "ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "product_identification_helper": { "purl": "pkg:oci/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-rhel8\u0026tag=v4.11.0-1686832830" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "product": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "product_id": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8\u0026tag=v4.11.0-1686831582" } } }, { "category": "product_version", "name": "ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "product": { "name": "ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "product_id": "ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-rhel8\u0026tag=v4.11.0-1686832830" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "product": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "product_id": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "product_identification_helper": { "purl": "pkg:oci/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-agent-base-rhel8\u0026tag=v4.11.0-1686831582" } } }, { "category": "product_version", "name": "ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "product": { "name": "ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "product_id": "ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "product_identification_helper": { "purl": "pkg:oci/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4/jenkins-rhel8\u0026tag=v4.11.0-1686832830" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64 as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64" }, "product_reference": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "relates_to_product_reference": "8Base-OCP-Tools-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le" }, "product_reference": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "relates_to_product_reference": "8Base-OCP-Tools-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64" }, "product_reference": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "relates_to_product_reference": "8Base-OCP-Tools-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" }, "product_reference": "ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "relates_to_product_reference": "8Base-OCP-Tools-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x" }, "product_reference": "ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "relates_to_product_reference": "8Base-OCP-Tools-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le" }, "product_reference": "ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "relates_to_product_reference": "8Base-OCP-Tools-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64 as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64" }, "product_reference": "ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "relates_to_product_reference": "8Base-OCP-Tools-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.11 for RHEL 8", "product_id": "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" }, "product_reference": "ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64", "relates_to_product_reference": "8Base-OCP-Tools-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "known_not_affected": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-19T10:32:56+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3664" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "known_not_affected": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-19T10:32:56+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3664" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "known_not_affected": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-19T10:32:56+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3664" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "known_not_affected": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-19T10:32:56+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3664" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "known_not_affected": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-19T10:32:56+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3664" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2161274" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "known_not_affected": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41717" }, { "category": "external", "summary": "RHBZ#2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717" }, { "category": "external", "summary": "https://go.dev/cl/455635", "url": "https://go.dev/cl/455635" }, { "category": "external", "summary": "https://go.dev/cl/455717", "url": "https://go.dev/cl/455717" }, { "category": "external", "summary": "https://go.dev/issue/56350", "url": "https://go.dev/issue/56350" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2022-1144", "url": "https://pkg.go.dev/vuln/GO-2022-1144" } ], "release_date": "2022-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-19T10:32:56+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3664" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0aa40f00ce3a9d9dad422e00eb3e726d5fa25d5fa86f94ff3db4aa55ec776b13_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:0fd1b4e1b169778f676fdceac6d8d8eec3ded32abe503933909bdf3e65707c2f_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:8e8bc685e43e595fc98e420d7187a8b9de0bbc7c6d27bf683d806cedccb6a4c4_amd64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-agent-base-rhel8@sha256:f60d566ae257cc302b0d4dc83f434bd8630bf80f760a7c144ddc347071b77fbf_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:4af748991937f5510f9b82a122eb1a854be311f67aaa99b58ccb628b03a8fe22_s390x", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:986d150664d8705598f3864737164141b41ed87806374d8f6f44829ffea2673b_ppc64le", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:c2367f2d7e31a0d984436cb9688de80d35191b4fae450780405ca26be64fa33d_arm64", "8Base-OCP-Tools-4.11:ocp-tools-4/jenkins-rhel8@sha256:e93d570f858c6608fe9dc76fb8019b4d48fc6db8ca885e59c769bacac3a636bb_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests" } ] }
rhsa-2022_6187
Vulnerability from csaf_redhat
Published
2022-08-25 10:08
Modified
2024-12-17 22:01
Summary
Red Hat Security Advisory: Node Health Check Operator 0.3.1 security update
Notes
Topic
An update for node-healthcheck-operator-bundle-container and node-healthcheck-operator-container is now available for Node Healthcheck Operator 0.3 for RHEL 8. This Operator is delivered by Red Hat Workload Availability.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is an updated release of the Node Health Check Operator. You can use the Node Health Check Operator to deploy the Node Health Check controller. The controller identifies unhealthy nodes and uses the Self Node Remediation Operator to remediate the unhealthy nodes.
Security Fix(es):
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for node-healthcheck-operator-bundle-container and node-healthcheck-operator-container is now available for Node Healthcheck Operator 0.3 for RHEL 8. This Operator is delivered by Red Hat Workload Availability.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is an updated release of the Node Health Check Operator. You can use the Node Health Check Operator to deploy the Node Health Check controller. The controller identifies unhealthy nodes and uses the Self Node Remediation Operator to remediate the unhealthy nodes.\n\nSecurity Fix(es):\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6187", "url": "https://access.redhat.com/errata/RHSA-2022:6187" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6187.json" } ], "title": "Red Hat Security Advisory: Node Health Check Operator 0.3.1 security update", "tracking": { "current_release_date": "2024-12-17T22:01:38+00:00", "generator": { "date": "2024-12-17T22:01:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6187", "initial_release_date": "2022-08-25T10:08:43+00:00", "revision_history": [ { "date": "2022-08-25T10:08:43+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-25T10:08:43+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:01:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Node Healthcheck Operator 0.3 for RHEL 8", "product": { "name": "Node Healthcheck Operator 0.3 for RHEL 8", "product_id": "8Base-NODE-HEALTHCHECK-OPERATOR-0.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:workload_availability_node_healthcheck:0.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Workload Availability" }, { "branches": [ { "category": "product_version", "name": "workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64", "product": { "name": "workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64", "product_id": "workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64", "product_identification_helper": { "purl": "pkg:oci/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58?arch=amd64\u0026repository_url=registry.redhat.io/workload-availability/node-healthcheck-operator-bundle\u0026tag=v0.3.1-1" } } }, { "category": "product_version", "name": "workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64", "product": { "name": "workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64", "product_id": "workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64", "product_identification_helper": { "purl": "pkg:oci/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3?arch=amd64\u0026repository_url=registry.redhat.io/workload-availability/node-healthcheck-rhel8-operator\u0026tag=v0.3.1-1" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64 as a component of Node Healthcheck Operator 0.3 for RHEL 8", "product_id": "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64" }, "product_reference": "workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64", "relates_to_product_reference": "8Base-NODE-HEALTHCHECK-OPERATOR-0.3" }, { "category": "default_component_of", "full_product_name": { "name": "workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64 as a component of Node Healthcheck Operator 0.3 for RHEL 8", "product_id": "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" }, "product_reference": "workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64", "relates_to_product_reference": "8Base-NODE-HEALTHCHECK-OPERATOR-0.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ], "known_not_affected": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-25T10:08:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64", "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ], "known_not_affected": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-25T10:08:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64", "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ], "known_not_affected": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-25T10:08:43+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, see:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-operator-bundle@sha256:8223bda16ac5ffac4b7407c849c4c30ee006ddafd34cad8a03d2af8314d56f58_amd64", "8Base-NODE-HEALTHCHECK-OPERATOR-0.3:workload-availability/node-healthcheck-rhel8-operator@sha256:3ce6b1557d00691dbaa869a1efe36098dc0b764196141d7777b82f355b35b8e3_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" } ] }
rhsa-2022_5337
Vulnerability from csaf_redhat
Published
2022-06-30 21:00
Modified
2024-12-17 21:58
Summary
Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update
Notes
Topic
An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Update to Go 1.17.10 (BZ#2091077)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nSecurity Fix(es):\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Update to Go 1.17.10 (BZ#2091077)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5337", "url": "https://access.redhat.com/errata/RHSA-2022:5337" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5337.json" } ], "title": "Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T21:58:48+00:00", "generator": { "date": "2024-12-17T21:58:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5337", "initial_release_date": "2022-06-30T21:00:23+00:00", "revision_history": [ { "date": "2022-06-30T21:00:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-06-30T21:00:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:58:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "go-toolset:rhel8:8060020220527144311:97d7f71f", "product": { "name": "go-toolset:rhel8:8060020220527144311:97d7f71f", "product_id": "go-toolset:rhel8:8060020220527144311:97d7f71f", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/go-toolset@rhel8:8060020220527144311:97d7f71f" } } }, { "category": "product_version", "name": "golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product": { "name": "golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_id": "golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product": { "name": "golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_id": "golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product": { "name": "golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_id": "golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product": { "name": "golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_id": "golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product_id": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=aarch64" } } }, { "category": "product_version", "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product_id": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product_id": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "product": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "product_id": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=src" } } }, { "category": "product_version", "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "product": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "product_id": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=src" } } }, { "category": "product_version", "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "product": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "product_id": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product_id": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product_id": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product_id": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product_id": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=s390x" } } }, { "category": "product_version", "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product_id": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product_id": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_id": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product": { "name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_id": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debuginfo@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64" } } }, { "category": "product_version", "name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product": { "name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_id": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/delve-debugsource@1.7.2-1.module%2Bel8.6.0%2B12972%2Bebab5911?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_id": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=x86_64" } } }, { "category": "product_version", "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_id": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_id": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product": { "name": "golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_id": "golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.17.10-1.module%2Bel8.6.0%2B15486%2B6d4da7db?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, "product_reference": "go-toolset:rhel8:8060020220527144311:97d7f71f", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src" }, "product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64" }, "product_reference": "delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64" }, "product_reference": "delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64" }, "product_reference": "delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64" }, "product_reference": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le" }, "product_reference": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x" }, "product_reference": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src" }, "product_reference": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64" }, "product_reference": "go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64" }, "product_reference": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le" }, "product_reference": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x" }, "product_reference": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src" }, "product_reference": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64" }, "product_reference": "golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64" }, "product_reference": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le" }, "product_reference": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x" }, "product_reference": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64" }, "product_reference": "golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" }, "product_reference": "golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" }, "product_reference": "golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64 as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64" }, "product_reference": "golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" }, "product_reference": "golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch as a component of go-toolset:rhel8:8060020220527144311:97d7f71f as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" }, "product_reference": "golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T21:00:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5337" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T21:00:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5337" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T21:00:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5337" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T21:00:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5337" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debuginfo-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:delve-debugsource-0:1.7.2-1.module+el8.6.0+12972+ebab5911.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:go-toolset-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.src", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.aarch64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.ppc64le", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.s390x", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-bin-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-docs-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-misc-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-race-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.x86_64", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-src-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch", "AppStream-8.6.0.Z.MAIN.EUS:go-toolset:rhel8:8060020220527144311:97d7f71f:golang-tests-0:1.17.10-1.module+el8.6.0+15486+6d4da7db.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" } ] }
rhsa-2022_6042
Vulnerability from csaf_redhat
Published
2022-08-10 11:39
Modified
2024-12-17 22:00
Summary
Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.24.0
Notes
Topic
Release of OpenShift Serverless Client kn 1.24.0
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.
Security Fix(es):
- prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
- go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)
- golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
- golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
- golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
- golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
- golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
- golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
- golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
- golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
- golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
- golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
- golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact; a CVSS
score; acknowledgments; and other related information refer to the CVE page(s)
listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Release of OpenShift Serverless Client kn 1.24.0\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Serverless Client kn 1.24.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.24.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.\n\nSecurity Fix(es):\n- prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n- go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)\n- golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n- golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n- golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\n- golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n- golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n- golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n- golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n- golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n- golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n- golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n- golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issue(s), including the impact; a CVSS\nscore; acknowledgments; and other related information refer to the CVE page(s)\nlisted in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6042", "url": "https://access.redhat.com/errata/RHSA-2022:6042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2094982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094982" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "2108527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108527" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6042.json" } ], "title": "Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.24.0", "tracking": { "current_release_date": "2024-12-17T22:00:26+00:00", "generator": { "date": "2024-12-17T22:00:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6042", "initial_release_date": "2022-08-10T11:39:17+00:00", "revision_history": [ { "date": "2022-08-10T11:39:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-10T11:39:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:00:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Serverless 1.0", "product": { "name": "Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:serverless:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Serverless" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:1.3.1-4.el8.src", "product": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.src", "product_id": "openshift-serverless-clients-0:1.3.1-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:1.3.1-4.el8.x86_64", "product": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.x86_64", "product_id": "openshift-serverless-clients-0:1.3.1-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "product": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "product_id": "openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-serverless-clients-0:1.3.1-4.el8.s390x", "product": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.s390x", "product_id": "openshift-serverless-clients-0:1.3.1-4.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-serverless-clients@1.3.1-4.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.ppc64le as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le" }, "product_reference": "openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.s390x as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x" }, "product_reference": "openshift-serverless-clients-0:1.3.1-4.el8.s390x", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.src as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src" }, "product_reference": "openshift-serverless-clients-0:1.3.1-4.el8.src", "relates_to_product_reference": "8Base-Openshift-Serverless-1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-serverless-clients-0:1.3.1-4.el8.x86_64 as a component of Red Hat OpenShift Serverless 1.0", "product_id": "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" }, "product_reference": "openshift-serverless-clients-0:1.3.1-4.el8.x86_64", "relates_to_product_reference": "8Base-Openshift-Serverless-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "cve": "CVE-2022-1996", "cwe": { "id": "CWE-639", "name": "Authorization Bypass Through User-Controlled Key" }, "discovery_date": "2022-06-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2094982" } ], "notes": [ { "category": "description", "text": "A flaw was found in CORS Filter feature from the go-restful package. When a user inputs a domain which is in AllowedDomains, all domains starting with the same pattern are accepted. This issue could allow an attacker to break the CORS policy by allowing any page to make requests and retrieve data on behalf of users.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-restful: Authorization Bypass Through User-Controlled Key", "title": "Vulnerability summary" }, { "category": "other", "text": "The go-restful package is a transitive dependency which is being pulled with k8s.io/api and not directly being used anywhere in OpenShift Container Platform (OCP), OpenShift Container Storage, OpenShift Data Foundation, OpenShift Do and OpenShift Pipelines, hence these components are marked as \u0027Will not fix\u0027 or even \"Not affected\".", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1996" }, { "category": "external", "summary": "RHBZ#2094982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094982" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1996", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1996" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1996", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1996" } ], "release_date": "2022-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "go-restful: Authorization Bypass Through User-Controlled Key" }, { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T11:39:17+00:00", "details": "See the Red Hat OpenShift Container Platform 4.6 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.7 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.8 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.8/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.9 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.9/html/serverless/index\nSee the Red Hat OpenShift Container Platform 4.10 documentation at:\nhttps://access.redhat.com/documentation/en-us/openshift_container_platform/4.10/html/serverless/index", "product_ids": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.ppc64le", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.s390x", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.src", "8Base-Openshift-Serverless-1:openshift-serverless-clients-0:1.3.1-4.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" } ] }
rhsa-2022_5415
Vulnerability from csaf_redhat
Published
2022-06-30 17:34
Modified
2024-12-17 21:58
Summary
Red Hat Security Advisory: go-toolset-1.17 and go-toolset-1.17-golang security and bug fix update
Notes
Topic
An update for go-toolset-1.17 and go-toolset-1.17-golang is now available for Red Hat Developer Tools.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Security Fix(es):
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Update to Go 1.17.10 (BZ#2091072)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset-1.17 and go-toolset-1.17-golang is now available for Red Hat Developer Tools.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.\n\nSecurity Fix(es):\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Update to Go 1.17.10 (BZ#2091072)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5415", "url": "https://access.redhat.com/errata/RHSA-2022:5415" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5415.json" } ], "title": "Red Hat Security Advisory: go-toolset-1.17 and go-toolset-1.17-golang security and bug fix update", "tracking": { "current_release_date": "2024-12-17T21:58:39+00:00", "generator": { "date": "2024-12-17T21:58:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5415", "initial_release_date": "2022-06-30T17:34:35+00:00", "revision_history": [ { "date": "2022-06-30T17:34:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-06-30T17:34:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:58:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2022" } } }, { "category": "product_name", "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:devtools:2022" } } } ], "category": "product_family", "name": "Red Hat Developer Tools" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.17-0:1.17.10-1.el7_9.src", "product": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.src", "product_id": "go-toolset-1.17-0:1.17.10-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17@1.17.10-1.el7_9?arch=src" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "product": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "product_id": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang@1.17.10-1.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-build@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-runtime@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-scldevel@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-bin@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-misc@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-race@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-src@1.17.10-1.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "product": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "product_id": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-tests@1.17.10-1.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-build@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-runtime@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-scldevel@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-bin@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-misc@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-src@1.17.10-1.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "product": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "product_id": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-tests@1.17.10-1.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-build@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-runtime@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-scldevel@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-bin@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-misc@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-src@1.17.10-1.el7_9?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "product": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "product_id": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-tests@1.17.10-1.el7_9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "product": { "name": "go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "product_id": "go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset-1.17-golang-docs@1.17.10-1.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.src", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch" }, "product_reference": "go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Server-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.src", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.src as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch" }, "product_reference": "go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le" }, "product_reference": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x" }, "product_reference": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "relates_to_product_reference": "7Workstation-DevTools-2022.2" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64 as a component of Red Hat Developer Tools for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" }, "product_reference": "go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "relates_to_product_reference": "7Workstation-DevTools-2022.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" ], "known_not_affected": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T17:34:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5415" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" ], "known_not_affected": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T17:34:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5415" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" ], "known_not_affected": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-30T17:34:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5415" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Server-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Server-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-build-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.src", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-bin-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-docs-0:1.17.10-1.el7_9.noarch", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-misc-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-race-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-src-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-golang-tests-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-runtime-0:1.17.10-1.el7_9.x86_64", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.ppc64le", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.s390x", "7Workstation-DevTools-2022.2:go-toolset-1.17-scldevel-0:1.17.10-1.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" } ] }
rhsa-2022_5006
Vulnerability from csaf_redhat
Published
2022-06-13 12:43
Modified
2024-12-17 21:57
Summary
Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 Containers security update
Notes
Topic
Red Hat OpenShift Service Mesh 2.1.3.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.
This advisory covers the RPM packages for the release.
Security Fix(es):
* eventsource: Exposure of Sensitive Information (CVE-2022-1650)
* golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* Moment.js: Path traversal in moment.locale (CVE-2022-24785)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Service Mesh 2.1.3.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Service Mesh is Red Hat\u0027s distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation.\n\nThis advisory covers the RPM packages for the release.\n\nSecurity Fix(es):\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n* golang: crypto/elliptic IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5006", "url": "https://access.redhat.com/errata/RHSA-2022:5006" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "OSSM-1609", "url": "https://issues.redhat.com/browse/OSSM-1609" }, { "category": "external", "summary": "OSSM-1617", "url": "https://issues.redhat.com/browse/OSSM-1617" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5006.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.3 Containers security update", "tracking": { "current_release_date": "2024-12-17T21:57:57+00:00", "generator": { "date": "2024-12-17T21:57:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5006", "initial_release_date": "2022-06-13T12:43:57+00:00", "revision_history": [ { "date": "2022-06-13T12:43:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-06-13T12:43:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:57:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Service Mesh 2.1", "product": { "name": "OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_mesh:2.1::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Service Mesh" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.36.10-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "product": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "product_id": "openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8-operator\u0026tag=1.36.10-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "product": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "product_id": "openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "product_identification_helper": { "purl": "pkg:oci/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "product": { "name": "openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "product_id": "openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "product_identification_helper": { "purl": "pkg:oci/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-rhel8-operator\u0026tag=2.1.3-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "product": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "product_id": "openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/prometheus-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.1.3-1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.36.10-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "product": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "product_id": "openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8-operator\u0026tag=1.36.10-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "product": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "product_id": "openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "product_identification_helper": { "purl": "pkg:oci/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "product": { "name": "openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "product_id": "openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "product_identification_helper": { "purl": "pkg:oci/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-rhel8-operator\u0026tag=2.1.3-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "product": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "product_id": "openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/prometheus-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261?arch=amd64\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.1.3-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "product": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "product_id": "openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-cni-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "product": { "name": "openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "product_id": "openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/grafana-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8\u0026tag=1.36.10-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "product": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "product_id": "openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/kiali-rhel8-operator\u0026tag=1.36.10-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "product": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "product_id": "openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "product_identification_helper": { "purl": "pkg:oci/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "product": { "name": "openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "product_id": "openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "product_identification_helper": { "purl": "pkg:oci/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/istio-rhel8-operator\u0026tag=2.1.3-2" } } }, { "category": "product_version", "name": "openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "product": { "name": "openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "product_id": "openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/pilot-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "product": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "product_id": "openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "product_identification_helper": { "purl": "pkg:oci/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/prometheus-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "product": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "product_id": "openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/proxyv2-rhel8\u0026tag=2.1.3-1" } } }, { "category": "product_version", "name": "openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "product": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "product_id": "openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-service-mesh/ratelimit-rhel8\u0026tag=2.1.3-1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le" }, "product_reference": "openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le" }, "product_reference": "openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64" }, "product_reference": "openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x" }, "product_reference": "openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le" }, "product_reference": "openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le" }, "product_reference": "openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x" }, "product_reference": "openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64" }, "product_reference": "openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" }, "product_reference": "openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64" }, "product_reference": "openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x" }, "product_reference": "openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64" }, "product_reference": "openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le" }, "product_reference": "openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le" }, "product_reference": "openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "relates_to_product_reference": "8Base-OSSM-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64 as a component of OpenShift Service Mesh 2.1", "product_id": "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" }, "product_reference": "openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64", "relates_to_product_reference": "8Base-OSSM-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1650", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-05-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085307" } ], "notes": [ { "category": "description", "text": "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user\u0027s credentials and then use the credentials to access the legitimate website.", "title": "Vulnerability description" }, { "category": "summary", "text": "eventsource: Exposure of Sensitive Information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "known_not_affected": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1650" }, { "category": "external", "summary": "RHBZ#2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650" }, { "category": "external", "summary": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", "url": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-13T12:43:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5006" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eventsource: Exposure of Sensitive Information" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "known_not_affected": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-13T12:43:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5006" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "known_not_affected": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-13T12:43:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5006" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "known_not_affected": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-13T12:43:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5006" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "known_not_affected": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-06-13T12:43:57+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5006" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:421fd50a8b2ee0e7765fc624827009c183925f0c3e8e05a0b764ad50cfd277cc_s390x", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:80f846861ea0da09cfdceaf88febad3fcc81a3fbcaf152c864c0178b46da99af_amd64", "8Base-OSSM-2.1:openshift-service-mesh/grafana-rhel8@sha256:fa1bea01162ee5384ff97d6fed0f17b25261c5413c40365ccf1dedd990079ddb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:1766bc2099296825dac5e2ac6950973f530068aee712c63e48eb0ea62c6822f8_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:461939e81840a7c1bc9c894b5cd907c781fab5a109e053619e53c333311299c3_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-cni-rhel8@sha256:d35bf874ea380d8bb261dcd44acc097cfbe30a5116b1b5270345f823b08f5c6a_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:2a82697fb50eaea57e19a3306bdeeb500194ad2209307818e4a30e3e104efb53_amd64", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:59318d17b29c8b1e6b2edb177a116b41ccebd935c6a4a0a64e2683080ee06151_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-must-gather-rhel8@sha256:82488010b224ad5ec34d428ed6e17ba973a628a871e5d11208b98f30f9e2e579_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:190c9fbfadb21dcfb86e911beae6b0871cc8bef3d0d94f7001e9a805d61e3677_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:2bd7402728aed0af2359038c4ec30dd82f74024a34fabc07ec92f91ec38bbb58_s390x", "8Base-OSSM-2.1:openshift-service-mesh/istio-rhel8-operator@sha256:bf7e1d66d324023365b266046e95e2486726728779cba6822ed66842ea72706f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:3a603914d980b7f50e587ae778ca80ef3ecd8c802dc94ee4045c3b79c8f3fccb_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:6d6a35aa10dc35bafc4dc1ba84f7490e2c81515af7d55e394c50061adbab73f8_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8-operator@sha256:81953c48689b1504a3b7493736bf95ae034f23b57904f36e63cb1ef738433f6a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:180a8353d6c49ae0683c9503bca87fa63bb770f7f21eb4b7132221635a54e76a_amd64", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:24bf5471e8b80ecc7e7bf78697ffdeb11f9aef24dfcc1e9a70002d8595058c53_s390x", "8Base-OSSM-2.1:openshift-service-mesh/kiali-rhel8@sha256:b8dcb96c7f8fb1668b5ddcc8fd96e5f252ca351b128160362f188d77df24a3c9_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:2cbb992dd88ec3e121c794ecb6d54ee4c2a15058d51e0302605d0be8304688f8_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:6c4a161a5fc080a1ed60bce59a8e6e547d67d5f106be4c0ce6e1482462426d63_s390x", "8Base-OSSM-2.1:openshift-service-mesh/pilot-rhel8@sha256:7c5f3f4854e768285d2a47647a585b7bf93ee0ee0e01a0cb938c72c7f54af192_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:a0faa36376620395fda20353f55dc99fe818883b6d90dba7160288498efa26aa_s390x", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:bf1b96c1d5debd1553a8dbac1a958c1f705f481d91ee376e339a494869b3fe3f_amd64", "8Base-OSSM-2.1:openshift-service-mesh/prometheus-rhel8@sha256:dd85b4878cae2830db264bb7c01230fde316a0de8e5385ca9ea5a454156a4093_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:215c0e0122b2d8e01721350a023741b24623884385da9cf57f32cd9bd4adb6aa_amd64", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:2fce4ae6966d9739322f7a073c137136593508b29d058bb3556aba021af25409_s390x", "8Base-OSSM-2.1:openshift-service-mesh/proxyv2-rhel8@sha256:915caeda1e92378cf59087213301ca07234570ae04561b9de19196bbf29475e4_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:400e8ea6ad46cae63b321bad3e8ca30189c9d5b0713e2c0c2cf1ca811f959ad1_s390x", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:811afd6e88b72f09a091ba5304891c88afd968ddbe634622257c752374747c85_ppc64le", "8Base-OSSM-2.1:openshift-service-mesh/ratelimit-rhel8@sha256:826c9104f2c626c0ffb98a05c4a938d09af5b1adf0b756966e6cc739b4614261_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" } ] }
rhsa-2023_4003
Vulnerability from csaf_redhat
Published
2023-07-10 09:56
Modified
2024-12-17 22:22
Summary
Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update
Notes
Topic
This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud.
A service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site.
Security Fix(es):
* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)
* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)
* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)
* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)
* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)
* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)
* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)
* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This is release 1.4 of the rpms for Red Hat Service Interconnect. Red Hat Service Interconnect 1.4 introduces a service network, linking TCP and HTTP services across the hybrid cloud.\nA service network enables communication between services running in different network locations or sites. It allows geographically distributed services to connect as if they were all running in the same site.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site.\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)\n\n* golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724)\n\n* golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725)\n\n* golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)\n\n* golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)\n\n* golang: go/parser: Infinite loop in parsing (CVE-2023-24537)\n\n* golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)\n\n* golang: html/template: improper sanitization of CSS values (CVE-2023-24539)\n\n* golang: html/template: improper handling of empty HTML attributes (CVE-2023-29400)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4003", "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "external", "summary": "2184483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483" }, { "category": "external", "summary": "2184484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484" }, { "category": "external", "summary": "2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_service_interconnect", "url": "https://access.redhat.com/documentation/en-us/red_hat_service_interconnect" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "2178488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488" }, { "category": "external", "summary": "2178492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492" }, { "category": "external", "summary": "2184482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482" }, { "category": "external", "summary": "2184481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4003.json" } ], "title": "Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update", "tracking": { "current_release_date": "2024-12-17T22:22:02+00:00", "generator": { "date": "2024-12-17T22:22:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:4003", "initial_release_date": "2023-07-10T09:56:57+00:00", "revision_history": [ { "date": "2023-07-10T09:56:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-10T09:56:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:22:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Service Interconnect", "product": { "name": "Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_interconnect:1::el8" } } }, { "category": "product_name", "name": "Red Hat Service Interconnect 1", "product": { "name": "Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_interconnect:1::el9" } } } ], "category": "product_family", "name": "Red Hat Service Interconnect" }, { "branches": [ { "category": "product_version", "name": "libwebsockets-0:4.3.1-1.el8ai.src", "product": { "name": "libwebsockets-0:4.3.1-1.el8ai.src", "product_id": "libwebsockets-0:4.3.1-1.el8ai.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets@4.3.1-1.el8ai?arch=src" } } }, { "category": "product_version", "name": "skupper-router-0:2.4.1-2.el8.src", "product": { "name": "skupper-router-0:2.4.1-2.el8.src", "product_id": "skupper-router-0:2.4.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router@2.4.1-2.el8?arch=src" } } }, { "category": "product_version", "name": "qpid-proton-0:0.37.0-2.el8ai.src", "product": { "name": "qpid-proton-0:0.37.0-2.el8ai.src", "product_id": "qpid-proton-0:0.37.0-2.el8ai.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton@0.37.0-2.el8ai?arch=src" } } }, { "category": "product_version", "name": "skupper-cli-0:1.4.1-2.el8.src", "product": { "name": "skupper-cli-0:1.4.1-2.el8.src", "product_id": "skupper-cli-0:1.4.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-cli@1.4.1-2.el8?arch=src" } } }, { "category": "product_version", "name": "libwebsockets-0:4.3.1-1.el9ai.src", "product": { "name": "libwebsockets-0:4.3.1-1.el9ai.src", "product_id": "libwebsockets-0:4.3.1-1.el9ai.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets@4.3.1-1.el9ai?arch=src" } } }, { "category": "product_version", "name": "skupper-router-0:2.4.1-2.el9.src", "product": { "name": "skupper-router-0:2.4.1-2.el9.src", "product_id": "skupper-router-0:2.4.1-2.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router@2.4.1-2.el9?arch=src" } } }, { "category": "product_version", "name": "qpid-proton-0:0.37.0-2.el9ai.src", "product": { "name": "qpid-proton-0:0.37.0-2.el9ai.src", "product_id": "qpid-proton-0:0.37.0-2.el9ai.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton@0.37.0-2.el9ai?arch=src" } } }, { "category": "product_version", "name": "jsoncpp-0:1.9.4-3.el9.src", "product": { "name": "jsoncpp-0:1.9.4-3.el9.src", "product_id": "jsoncpp-0:1.9.4-3.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jsoncpp@1.9.4-3.el9?arch=src" } } }, { "category": "product_version", "name": "skupper-cli-0:1.4.1-2.el9.src", "product": { "name": "skupper-cli-0:1.4.1-2.el9.src", "product_id": "skupper-cli-0:1.4.1-2.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-cli@1.4.1-2.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "libwebsockets-0:4.3.1-1.el8ai.x86_64", "product": { "name": "libwebsockets-0:4.3.1-1.el8ai.x86_64", "product_id": "libwebsockets-0:4.3.1-1.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets@4.3.1-1.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "product": { "name": "libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "product_id": "libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets-devel@4.3.1-1.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "product": { "name": "libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "product_id": "libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets-debugsource@4.3.1-1.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "product": { "name": "libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "product_id": "libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets-debuginfo@4.3.1-1.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-router-0:2.4.1-2.el8.x86_64", "product": { "name": "skupper-router-0:2.4.1-2.el8.x86_64", "product_id": "skupper-router-0:2.4.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router@2.4.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "product": { "name": "skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "product_id": "skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-debugsource@2.4.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "product": { "name": "skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "product_id": "skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-debuginfo@2.4.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "product": { "name": "python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "product_id": "python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-qpid-proton@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "product": { "name": "qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "product_id": "qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "product": { "name": "qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "product_id": "qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c-devel@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "product": { "name": "qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "product_id": "qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-debugsource@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product": { "name": "python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_id": "python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-qpid-proton-debuginfo@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "product": { "name": "qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_id": "qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c-debuginfo@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "product": { "name": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_id": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-cpp-debuginfo@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product": { "name": "qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_id": "qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-debuginfo@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product": { "name": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_id": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-qpid_proton-debuginfo@0.37.0-2.el8ai?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-cli-0:1.4.1-2.el8.x86_64", "product": { "name": "skupper-cli-0:1.4.1-2.el8.x86_64", "product_id": "skupper-cli-0:1.4.1-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-cli@1.4.1-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libwebsockets-0:4.3.1-1.el9ai.x86_64", "product": { "name": "libwebsockets-0:4.3.1-1.el9ai.x86_64", "product_id": "libwebsockets-0:4.3.1-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets@4.3.1-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "product": { "name": "libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "product_id": "libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets-devel@4.3.1-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "product": { "name": "libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "product_id": "libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets-debugsource@4.3.1-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "product": { "name": "libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "product_id": "libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libwebsockets-debuginfo@4.3.1-1.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-router-0:2.4.1-2.el9.x86_64", "product": { "name": "skupper-router-0:2.4.1-2.el9.x86_64", "product_id": "skupper-router-0:2.4.1-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router@2.4.1-2.el9?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "product": { "name": "skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "product_id": "skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-debugsource@2.4.1-2.el9?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "product": { "name": "skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "product_id": "skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-debuginfo@2.4.1-2.el9?arch=x86_64" } } }, { "category": "product_version", "name": "python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "product": { "name": "python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "product_id": "python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-qpid-proton@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c-devel@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-cpp@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-cpp-devel@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-debugsource@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product": { "name": "python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_id": "python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-qpid-proton-debuginfo@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-c-debuginfo@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-cpp-debuginfo@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product": { "name": "qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_id": "qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/qpid-proton-debuginfo@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product": { "name": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_id": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-qpid_proton-debuginfo@0.37.0-2.el9ai?arch=x86_64" } } }, { "category": "product_version", "name": "jsoncpp-0:1.9.4-3.el9.x86_64", "product": { "name": "jsoncpp-0:1.9.4-3.el9.x86_64", "product_id": "jsoncpp-0:1.9.4-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jsoncpp@1.9.4-3.el9?arch=x86_64" } } }, { "category": "product_version", "name": "jsoncpp-devel-0:1.9.4-3.el9.x86_64", "product": { "name": "jsoncpp-devel-0:1.9.4-3.el9.x86_64", "product_id": "jsoncpp-devel-0:1.9.4-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jsoncpp-devel@1.9.4-3.el9?arch=x86_64" } } }, { "category": "product_version", "name": "jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "product": { "name": "jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "product_id": "jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jsoncpp-debugsource@1.9.4-3.el9?arch=x86_64" } } }, { "category": "product_version", "name": "jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "product": { "name": "jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "product_id": "jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jsoncpp-debuginfo@1.9.4-3.el9?arch=x86_64" } } }, { "category": "product_version", "name": "skupper-cli-0:1.4.1-2.el9.x86_64", "product": { "name": "skupper-cli-0:1.4.1-2.el9.x86_64", "product_id": "skupper-cli-0:1.4.1-2.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-cli@1.4.1-2.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "skupper-router-common-0:2.4.1-2.el8.noarch", "product": { "name": "skupper-router-common-0:2.4.1-2.el8.noarch", "product_id": "skupper-router-common-0:2.4.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-common@2.4.1-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "skupper-router-docs-0:2.4.1-2.el8.noarch", "product": { "name": "skupper-router-docs-0:2.4.1-2.el8.noarch", "product_id": "skupper-router-docs-0:2.4.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-docs@2.4.1-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "skupper-router-tools-0:2.4.1-2.el8.noarch", "product": { "name": "skupper-router-tools-0:2.4.1-2.el8.noarch", "product_id": "skupper-router-tools-0:2.4.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-tools@2.4.1-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "skupper-router-common-0:2.4.1-2.el9.noarch", "product": { "name": "skupper-router-common-0:2.4.1-2.el9.noarch", "product_id": "skupper-router-common-0:2.4.1-2.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-common@2.4.1-2.el9?arch=noarch" } } }, { "category": "product_version", "name": "skupper-router-docs-0:2.4.1-2.el9.noarch", "product": { "name": "skupper-router-docs-0:2.4.1-2.el9.noarch", "product_id": "skupper-router-docs-0:2.4.1-2.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-docs@2.4.1-2.el9?arch=noarch" } } }, { "category": "product_version", "name": "skupper-router-tools-0:2.4.1-2.el9.noarch", "product": { "name": "skupper-router-tools-0:2.4.1-2.el9.noarch", "product_id": "skupper-router-tools-0:2.4.1-2.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/skupper-router-tools@2.4.1-2.el9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-0:4.3.1-1.el8ai.src as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src" }, "product_reference": "libwebsockets-0:4.3.1-1.el8ai.src", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-0:4.3.1-1.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64" }, "product_reference": "libwebsockets-0:4.3.1-1.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64" }, "product_reference": "libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64" }, "product_reference": "libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-devel-0:4.3.1-1.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64" }, "product_reference": "libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-qpid-proton-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-0:0.37.0-2.el8ai.src as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src" }, "product_reference": "qpid-proton-0:0.37.0-2.el8ai.src", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64" }, "product_reference": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-cli-0:1.4.1-2.el8.src as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src" }, "product_reference": "skupper-cli-0:1.4.1-2.el8.src", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-cli-0:1.4.1-2.el8.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64" }, "product_reference": "skupper-cli-0:1.4.1-2.el8.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-0:2.4.1-2.el8.src as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src" }, "product_reference": "skupper-router-0:2.4.1-2.el8.src", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-0:2.4.1-2.el8.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64" }, "product_reference": "skupper-router-0:2.4.1-2.el8.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-common-0:2.4.1-2.el8.noarch as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch" }, "product_reference": "skupper-router-common-0:2.4.1-2.el8.noarch", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-debuginfo-0:2.4.1-2.el8.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64" }, "product_reference": "skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-debugsource-0:2.4.1-2.el8.x86_64 as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64" }, "product_reference": "skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-docs-0:2.4.1-2.el8.noarch as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch" }, "product_reference": "skupper-router-docs-0:2.4.1-2.el8.noarch", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-tools-0:2.4.1-2.el8.noarch as a component of Red Hat Service Interconnect", "product_id": "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch" }, "product_reference": "skupper-router-tools-0:2.4.1-2.el8.noarch", "relates_to_product_reference": "8Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "jsoncpp-0:1.9.4-3.el9.src as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src" }, "product_reference": "jsoncpp-0:1.9.4-3.el9.src", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "jsoncpp-0:1.9.4-3.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64" }, "product_reference": "jsoncpp-0:1.9.4-3.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64" }, "product_reference": "jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "jsoncpp-debugsource-0:1.9.4-3.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64" }, "product_reference": "jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "jsoncpp-devel-0:1.9.4-3.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64" }, "product_reference": "jsoncpp-devel-0:1.9.4-3.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-0:4.3.1-1.el9ai.src as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src" }, "product_reference": "libwebsockets-0:4.3.1-1.el9ai.src", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-0:4.3.1-1.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64" }, "product_reference": "libwebsockets-0:4.3.1-1.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64" }, "product_reference": "libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64" }, "product_reference": "libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebsockets-devel-0:4.3.1-1.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64" }, "product_reference": "libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-qpid-proton-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-0:0.37.0-2.el9ai.src as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src" }, "product_reference": "qpid-proton-0:0.37.0-2.el9ai.src", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64" }, "product_reference": "rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-cli-0:1.4.1-2.el9.src as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src" }, "product_reference": "skupper-cli-0:1.4.1-2.el9.src", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-cli-0:1.4.1-2.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" }, "product_reference": "skupper-cli-0:1.4.1-2.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-0:2.4.1-2.el9.src as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src" }, "product_reference": "skupper-router-0:2.4.1-2.el9.src", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-0:2.4.1-2.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64" }, "product_reference": "skupper-router-0:2.4.1-2.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-common-0:2.4.1-2.el9.noarch as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch" }, "product_reference": "skupper-router-common-0:2.4.1-2.el9.noarch", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-debuginfo-0:2.4.1-2.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64" }, "product_reference": "skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-debugsource-0:2.4.1-2.el9.x86_64 as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64" }, "product_reference": "skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-docs-0:2.4.1-2.el9.noarch as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch" }, "product_reference": "skupper-router-docs-0:2.4.1-2.el9.noarch", "relates_to_product_reference": "9Base-Service-Interconnect-1" }, { "category": "default_component_of", "full_product_name": { "name": "skupper-router-tools-0:2.4.1-2.el9.noarch as a component of Red Hat Service Interconnect 1", "product_id": "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" }, "product_reference": "skupper-router-tools-0:2.4.1-2.el9.noarch", "relates_to_product_reference": "9Base-Service-Interconnect-1" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-2879", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/tar: unbounded memory consumption when reading headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2879" }, { "category": "external", "summary": "RHBZ#2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54853", "url": "https://github.com/golang/go/issues/54853" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/tar: unbounded memory consumption when reading headers" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" }, { "acknowledgments": [ { "names": [ "Philippe Antoine" ], "organization": "Catena Cyber" } ], "cve": "CVE-2022-41723", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178358" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding", "title": "Vulnerability summary" }, { "category": "other", "text": "Within OpenShift Container Platform, the maximum impact of this vulnerability is a denial of service against an individual container so the impact could not cascade across the entire infrastructure, this vulnerability is rated Moderate impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41723" }, { "category": "external", "summary": "RHBZ#2178358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41723" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h", "url": "https://github.com/advisories/GHSA-vvpx-j8f3-3w6h" }, { "category": "external", "summary": "https://go.dev/cl/468135", "url": "https://go.dev/cl/468135" }, { "category": "external", "summary": "https://go.dev/cl/468295", "url": "https://go.dev/cl/468295" }, { "category": "external", "summary": "https://go.dev/issue/57855", "url": "https://go.dev/issue/57855" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1571", "url": "https://pkg.go.dev/vuln/GO-2023-1571" }, { "category": "external", "summary": "https://vuln.go.dev/ID/GO-2023-1571.json", "url": "https://vuln.go.dev/ID/GO-2023-1571.json" } ], "release_date": "2023-02-17T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding" }, { "cve": "CVE-2022-41724", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178492" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: large handshake records may cause panics", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a denial of service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41724" }, { "category": "external", "summary": "RHBZ#2178492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41724" }, { "category": "external", "summary": "https://go.dev/cl/468125", "url": "https://go.dev/cl/468125" }, { "category": "external", "summary": "https://go.dev/issue/58001", "url": "https://go.dev/issue/58001" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1570", "url": "https://pkg.go.dev/vuln/GO-2023-1570" } ], "release_date": "2023-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/tls: large handshake records may cause panics" }, { "cve": "CVE-2022-41725", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-03-15T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2178488" } ], "notes": [ { "category": "description", "text": "A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption flaw in the net/http and mime/multipart packages. By sending a specially-crafted request, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, mime/multipart: denial of service from excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41725" }, { "category": "external", "summary": "RHBZ#2178488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178488" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41725" }, { "category": "external", "summary": "https://go.dev/cl/468124", "url": "https://go.dev/cl/468124" }, { "category": "external", "summary": "https://go.dev/issue/58006", "url": "https://go.dev/issue/58006" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E", "url": "https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2023-1569", "url": "https://pkg.go.dev/vuln/GO-2023-1569" } ], "release_date": "2023-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, mime/multipart: denial of service from excessive resource consumption" }, { "cve": "CVE-2023-24534", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184483" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, net/textproto: denial of service from excessive memory allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24534" }, { "category": "external", "summary": "RHBZ#2184483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24534", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24534" }, { "category": "external", "summary": "https://go.dev/issue/58975", "url": "https://go.dev/issue/58975" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, net/textproto: denial of service from excessive memory allocation" }, { "cve": "CVE-2023-24536", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184482" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an issue during multipart form parsing. By sending a specially crafted input, a remote attacker can consume large amounts of CPU and memory, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses Go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not-affected.\n* The CVE refers to multipart form parsing routine mime/multipart.Reader.ReadForm, which is not used in Grafana, hence it is not-affected.\n* Butane does not parse multipart forms, hence, it is also not-affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24536" }, { "category": "external", "summary": "RHBZ#2184482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184482" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24536", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24536" }, { "category": "external", "summary": "https://go.dev/issue/59153", "url": "https://go.dev/issue/59153" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption" }, { "cve": "CVE-2023-24537", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184484" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: Infinite loop in parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24537" }, { "category": "external", "summary": "RHBZ#2184484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24537", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24537" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59180", "url": "https://github.com/golang/go/issues/59180" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: Infinite loop in parsing" }, { "cve": "CVE-2023-24538", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-04-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2184481" } ], "notes": [ { "category": "description", "text": "A flaw was found in Golang Go. This flaw allows a remote attacker to execute arbitrary code on the system, caused by not properly considering backticks (`) as Javascript string delimiters. By sending a specially crafted request, an attacker execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: backticks not treated as string delimiters", "title": "Vulnerability summary" }, { "category": "other", "text": "The described issue involving Go templates and JavaScript template literals poses a moderate severity rather than an important one due to several mitigating factors. Firstly, the vulnerability requires specific conditions to be met: the presence of Go templates within JavaScript template literals. This limits the scope of affected codebases, reducing the likelihood of exploitation. Additionally, the decision to disallow such interactions in future releases of Go indicates a proactive approach to addressing the issue. Furthermore, the affected packages or components within Red Hat Enterprise Linux, such as Conmon, Grafana, and the RHC package, have been assessed and determined not to be impacted due to their specific usage patterns. So the limited scope of affected systems and the absence of exploitation vectors in specific components within Red Hat Enterprise Linux contribute to categorizing the severity of the issue as moderate.\n\nFor Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* The rhc package do not make use of html/template. Hence, it is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24538" }, { "category": "external", "summary": "RHBZ#2184481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184481" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24538", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24538" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59234", "url": "https://github.com/golang/go/issues/59234" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8", "url": "https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8" } ], "release_date": "2023-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: backticks not treated as string delimiters" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-24539", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196026" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang where angle brackets (\u003c\u003e) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a \u0027/\u0027 character could result in the CSS context unexpectedly closing, allowing for the injection of unexpected HMTL if executed with untrusted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper sanitization of CSS values", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore, the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24539" }, { "category": "external", "summary": "RHBZ#2196026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24539", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24539" }, { "category": "external", "summary": "https://github.com/golang/go/issues/59720", "url": "https://github.com/golang/go/issues/59720" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper sanitization of CSS values" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-29400", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196029" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Templates containing actions in unquoted HTML attributes, for example, \"attr={{.}}\") executed with empty input, could result in output that has unexpected results when parsed due to HTML normalization rules. This issue may allow the injection of arbitrary attributes into tags.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper handling of empty HTML attributes", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, not in the actual code. Thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn OpenShift Container Platform and Red Hat Advanced Cluster Management for Kubernetes (RHACM), the affected containers are behind OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users, reducing the impact to low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "known_not_affected": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-29400" }, { "category": "external", "summary": "RHBZ#2196029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196029" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-29400", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29400" }, { "category": "external", "summary": "https://go.dev/issue/59722", "url": "https://go.dev/issue/59722" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-10T09:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4003" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.src", "8Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el8ai.src", "8Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el8ai.x86_64", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.src", "8Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el8.x86_64", "8Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el8.noarch", "8Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el8.noarch", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.src", "9Base-Service-Interconnect-1:jsoncpp-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debuginfo-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-debugsource-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:jsoncpp-devel-0:1.9.4-3.el9.x86_64", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.src", "9Base-Service-Interconnect-1:libwebsockets-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debuginfo-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-debugsource-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:libwebsockets-devel-0:4.3.1-1.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:python3-qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-0:0.37.0-2.el9ai.src", "9Base-Service-Interconnect-1:qpid-proton-c-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-c-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-cpp-devel-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:qpid-proton-debugsource-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:rubygem-qpid_proton-debuginfo-0:0.37.0-2.el9ai.x86_64", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-cli-0:1.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.src", "9Base-Service-Interconnect-1:skupper-router-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-common-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-debuginfo-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-debugsource-0:2.4.1-2.el9.x86_64", "9Base-Service-Interconnect-1:skupper-router-docs-0:2.4.1-2.el9.noarch", "9Base-Service-Interconnect-1:skupper-router-tools-0:2.4.1-2.el9.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: html/template: improper handling of empty HTML attributes" } ] }
rhsa-2022_5729
Vulnerability from csaf_redhat
Published
2022-08-01 11:18
Modified
2024-12-17 21:58
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.10.25 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.10.25 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.10.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.25. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2022:5730
Security Fix(es):
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: regexp: stack exhaustion via a deeply nested expression
(CVE-2022-24921)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.10.25 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.10.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.25. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2022:5730\n\nSecurity Fix(es):\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* golang: regexp: stack exhaustion via a deeply nested expression\n(CVE-2022-24921)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5729", "url": "https://access.redhat.com/errata/RHSA-2022:5729" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5729.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.10.25 security update", "tracking": { "current_release_date": "2024-12-17T21:58:54+00:00", "generator": { "date": "2024-12-17T21:58:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5729", "initial_release_date": "2022-08-01T11:18:52+00:00", "revision_history": [ { "date": "2022-08-01T11:18:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-01T11:18:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:58:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el8" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el7" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "product_id": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "product": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "product_id": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.23.0-1.1.el8.src", "product": { "name": "cri-tools-0:1.23.0-1.1.el8.src", "product_id": "cri-tools-0:1.23.0-1.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.23.0-1.1.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "product": { "name": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "product_id": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.10.0-202207192015.p0.g012e945.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "product": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "product_id": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202207192015.p0.g1e68436.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.10.0-202207192015.p0.g45460a5.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "product": { "name": "openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "product_id": "openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic@19.0.1-0.20220712154507.f14c488.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "product": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "product_id": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-11.rhaos4.10.gitddf4b1a.1.el7?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.23.0-1.1.el7.src", "product": { "name": "cri-tools-0:1.23.0-1.1.el7.src", "product_id": "cri-tools-0:1.23.0-1.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.23.0-1.1.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "product": { "name": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "product_id": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.10.0-202207192015.p0.g012e945.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "product": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "product_id": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202207192015.p0.g1e68436.assembly.stream.el7?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "product": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "product_id": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.10.0-202207192015.p0.g45460a5.assembly.stream.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product_id": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product_id": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.23.0-1.1.el8.x86_64", "product": { "name": "cri-tools-0:1.23.0-1.1.el8.x86_64", "product_id": "cri-tools-0:1.23.0-1.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.23.0-1.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.23.0-1.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.23.0-1.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.10.0-202207192015.p0.g012e945.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.10.0-202207192015.p0.g45460a5.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.10.0-202207192015.p0.g45460a5.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "product": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "product_id": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-11.rhaos4.10.gitddf4b1a.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "product": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "product_id": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-11.rhaos4.10.gitddf4b1a.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.23.0-1.1.el7.x86_64", "product": { "name": "cri-tools-0:1.23.0-1.1.el7.x86_64", "product_id": "cri-tools-0:1.23.0-1.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.23.0-1.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "product_id": "cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.23.0-1.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "product": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "product_id": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.10.0-202207192015.p0.g012e945.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "product_id": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.10.0-202207192015.p0.g45460a5.assembly.stream.el7?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "product_id": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.10.0-202207192015.p0.g45460a5.assembly.stream.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "product": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "product_id": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product_id": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product_id": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product_id": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-0:1.23.0-1.1.el8.aarch64", "product": { "name": "cri-tools-0:1.23.0-1.1.el8.aarch64", "product_id": "cri-tools-0:1.23.0-1.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.23.0-1.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "product": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "product_id": "cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.23.0-1.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "product": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "product_id": "cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.23.0-1.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "product": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "product_id": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.10.0-202207192015.p0.g012e945.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "product": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "product_id": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.10.0-202207192015.p0.g45460a5.assembly.stream.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product_id": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.23.0-1.1.el8.ppc64le", "product": { "name": "cri-tools-0:1.23.0-1.1.el8.ppc64le", "product_id": "cri-tools-0:1.23.0-1.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.23.0-1.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.23.0-1.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.23.0-1.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.10.0-202207192015.p0.g012e945.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.10.0-202207192015.p0.g45460a5.assembly.stream.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product_id": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product_id": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product_id": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.23.3-11.rhaos4.10.gitddf4b1a.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.23.0-1.1.el8.s390x", "product": { "name": "cri-tools-0:1.23.0-1.1.el8.s390x", "product_id": "cri-tools-0:1.23.0-1.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.23.0-1.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "product_id": "cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.23.0-1.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.23.0-1.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.10.0-202207192015.p0.g012e945.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.10.0-202207192015.p0.g45460a5.assembly.stream.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "product_id": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202207192015.p0.g1e68436.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "product_id": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.10.0-202207192015.p0.g1e68436.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product": { "name": "openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_id": "openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-api@19.0.1-0.20220712154507.f14c488.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product": { "name": "openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_id": "openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-common@19.0.1-0.20220712154507.f14c488.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product": { "name": "openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_id": "openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-conductor@19.0.1-0.20220712154507.f14c488.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product": { "name": "python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_id": "python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-tests@19.0.1-0.20220712154507.f14c488.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "product_id": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.10.0-202207192015.p0.g1e68436.assembly.stream.el7?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "product": { "name": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "product_id": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.10.0-202207192015.p0.g1e68436.assembly.stream.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src" }, "product_reference": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64" }, "product_reference": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.23.0-1.1.el7.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src" }, "product_reference": "cri-tools-0:1.23.0-1.1.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.23.0-1.1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64" }, "product_reference": "cri-tools-0:1.23.0-1.1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src" }, "product_reference": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src" }, "product_reference": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch" }, "product_reference": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src" }, "product_reference": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64" }, "product_reference": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "relates_to_product_reference": "7Server-RH7-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64" }, "product_reference": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64" }, "product_reference": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le" }, "product_reference": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x" }, "product_reference": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src" }, "product_reference": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64" }, "product_reference": "cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64" }, "product_reference": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64" }, "product_reference": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.23.0-1.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64" }, "product_reference": "cri-tools-0:1.23.0-1.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.23.0-1.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le" }, "product_reference": "cri-tools-0:1.23.0-1.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.23.0-1.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x" }, "product_reference": "cri-tools-0:1.23.0-1.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.23.0-1.1.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src" }, "product_reference": "cri-tools-0:1.23.0-1.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.23.0-1.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64" }, "product_reference": "cri-tools-0:1.23.0-1.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64" }, "product_reference": "cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64" }, "product_reference": "cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src" }, "product_reference": "openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64" }, "product_reference": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64" }, "product_reference": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src" }, "product_reference": "openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch" }, "product_reference": "openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch" }, "product_reference": "openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch" }, "product_reference": "openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch" }, "product_reference": "python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T11:18:52+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5729" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T11:18:52+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5729" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T11:18:52+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5729" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T11:18:52+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5729" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T11:18:52+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5729" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64" ], "known_not_affected": [ "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T11:18:52+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5729" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.src", "7Server-RH7-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el7.noarch", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.src", "7Server-RH7-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el7.x86_64", "7Server-RH7-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el7.x86_64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.10:atomic-openshift-service-idler-0:4.10.0-202207192015.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.src", "8Base-RHOSE-4.10:cri-o-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debuginfo-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.aarch64", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.s390x", "8Base-RHOSE-4.10:cri-o-debugsource-0:1.23.3-11.rhaos4.10.gitddf4b1a.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.src", "8Base-RHOSE-4.10:cri-tools-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debuginfo-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.aarch64", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.ppc64le", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.s390x", "8Base-RHOSE-4.10:cri-tools-debugsource-0:1.23.0-1.1.el8.x86_64", "8Base-RHOSE-4.10:openshift-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-ansible-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-ansible-test-0:4.10.0-202207192015.p0.g1e68436.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-clients-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-clients-redistributable-0:4.10.0-202207192015.p0.g45460a5.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.aarch64", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.s390x", "8Base-RHOSE-4.10:openshift-hyperkube-0:4.10.0-202207192015.p0.g012e945.assembly.stream.el8.x86_64", "8Base-RHOSE-4.10:openshift-kuryr-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.src", "8Base-RHOSE-4.10:openshift-kuryr-cni-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-common-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openshift-kuryr-controller-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-1:19.0.1-0.20220712154507.f14c488.el8.src", "8Base-RHOSE-4.10:openstack-ironic-api-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-common-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:openstack-ironic-conductor-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-ironic-tests-1:19.0.1-0.20220712154507.f14c488.el8.noarch", "8Base-RHOSE-4.10:python3-kuryr-kubernetes-0:4.10.0-202207192015.p0.ge96efa4.assembly.stream.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" } ] }
rhsa-2022_6156
Vulnerability from csaf_redhat
Published
2022-08-24 13:45
Modified
2024-12-18 00:35
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update
Notes
Topic
Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
* eventsource: Exposure of Sensitive Information (CVE-2022-1650)
* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
* nodejs-set-value: type confusion allows bypass of CVE-2019-10747 (CVE-2021-23440)
* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)
* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
* follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery (CVE-2022-24771)
* node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)
* node-forge: Signature verification leniency in checking `DigestInfo` structure (CVE-2022-24773)
* Moment.js: Path traversal in moment.locale (CVE-2022-24785)
* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
* go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
These updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated images, which provide numerous bug fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nSecurity Fix(es):\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)\n\n* nodejs-set-value: type confusion allows bypass of CVE-2019-10747 (CVE-2021-23440)\n\n* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)\n\n* node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)\n\n* follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)\n\n* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)\n\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery (CVE-2022-24771)\n\n* node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)\n\n* node-forge: Signature verification leniency in checking `DigestInfo` structure (CVE-2022-24773)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses (CVE-2022-29810)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\nThese updated images include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated images, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6156", "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index", "url": "https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index" }, { "category": "external", "summary": "1937117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937117" }, { "category": "external", "summary": "1947482", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947482" }, { "category": "external", "summary": "1973317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973317" }, { "category": "external", "summary": "1996829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996829" }, { "category": "external", "summary": "2004944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004944" }, { "category": "external", "summary": "2027724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027724" }, { "category": "external", "summary": "2029298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029298" }, { "category": "external", "summary": "2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2047173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047173" }, { "category": "external", "summary": "2050853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050853" }, { "category": "external", "summary": "2050897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050897" }, { "category": "external", "summary": "2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "2056697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056697" }, { "category": "external", "summary": "2058211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058211" }, { "category": "external", "summary": "2060487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060487" }, { "category": "external", "summary": "2060790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060790" }, { "category": "external", "summary": "2061713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061713" }, { "category": "external", "summary": "2063691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063691" }, { "category": "external", "summary": "2064426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064426" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2066514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066514" }, { "category": "external", "summary": "2067079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067079" }, { "category": "external", "summary": "2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "2067461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067461" }, { "category": "external", "summary": "2069314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069314" }, { "category": "external", "summary": "2069319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069319" }, { "category": "external", "summary": "2069812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069812" }, { "category": "external", "summary": "2069815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069815" }, { "category": "external", "summary": "2070542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070542" }, { "category": "external", "summary": "2071494", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071494" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2073920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073920" }, { "category": "external", "summary": "2074810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074810" }, { "category": "external", "summary": "2075426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075426" }, { "category": "external", "summary": "2075581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075581" }, { "category": "external", "summary": "2076457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076457" }, { "category": "external", "summary": "2077242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077242" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2079866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079866" }, { "category": "external", "summary": "2079873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079873" }, { "category": "external", "summary": "2080279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080279" }, { "category": "external", "summary": "2081680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081680" }, { "category": "external", "summary": "2082028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082028" }, { "category": "external", "summary": "2082078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082078" }, { "category": "external", "summary": "2082497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082497" }, { "category": "external", "summary": "2083074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083074" }, { "category": "external", "summary": "2083441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083441" }, { "category": "external", "summary": "2083953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083953" }, { "category": "external", "summary": "2083993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083993" }, { "category": "external", "summary": "2084041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084041" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2084201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084201" }, { "category": "external", "summary": "2084503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084503" }, { "category": "external", "summary": "2084546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084546" }, { "category": "external", "summary": "2084565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084565" }, { "category": "external", "summary": "2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "2085351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085351" }, { "category": "external", "summary": "2085357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085357" }, { "category": "external", "summary": "2086557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086557" }, { "category": "external", "summary": "2086675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086675" }, { "category": "external", "summary": "2086982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086982" }, { "category": "external", "summary": "2086983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086983" }, { "category": "external", "summary": "2087078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087078" }, { "category": "external", "summary": "2087107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087107" }, { "category": "external", "summary": "2087237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087237" }, { "category": "external", "summary": "2087675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087675" }, { "category": "external", "summary": "2087732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087732" }, { "category": "external", "summary": "2087755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087755" }, { "category": "external", "summary": "2088359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088359" }, { "category": "external", "summary": "2088380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088380" }, { "category": "external", "summary": "2088506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088506" }, { "category": "external", "summary": "2088587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088587" }, { "category": "external", "summary": "2089296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089296" }, { "category": "external", "summary": "2089342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089342" }, { "category": "external", "summary": "2089397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089397" }, { "category": "external", "summary": "2089552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089552" }, { "category": "external", "summary": "2089567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089567" }, { "category": "external", "summary": "2089786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089786" }, { "category": "external", "summary": "2089795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089795" }, { "category": "external", "summary": "2089797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089797" }, { "category": "external", "summary": "2090278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090278" }, { "category": "external", "summary": "2090314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090314" }, { "category": "external", "summary": "2090953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090953" }, { "category": "external", "summary": "2091487", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091487" }, { "category": "external", "summary": "2091638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091638" }, { "category": "external", "summary": "2091641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091641" }, { "category": "external", "summary": "2091681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091681" }, { "category": "external", "summary": "2091894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091894" }, { "category": "external", "summary": "2091951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091951" }, { "category": "external", "summary": "2091998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091998" }, { "category": "external", "summary": "2092143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092143" }, { "category": "external", "summary": "2092217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092217" }, { "category": "external", "summary": "2092220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092220" }, { "category": "external", "summary": "2092349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092349" }, { "category": "external", "summary": "2092372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092372" }, { "category": "external", "summary": "2092400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092400" }, { "category": "external", "summary": "2093266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093266" }, { "category": "external", "summary": "2093848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093848" }, { "category": "external", "summary": "2094179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094179" }, { "category": "external", "summary": "2094853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094853" }, { "category": "external", "summary": "2094856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094856" }, { "category": "external", "summary": "2095155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095155" }, { "category": "external", "summary": "2096209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096209" }, { "category": "external", "summary": "2096414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096414" }, { "category": "external", "summary": "2096509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096509" }, { "category": "external", "summary": "2096513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096513" }, { "category": "external", "summary": "2096823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096823" }, { "category": "external", "summary": "2096937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096937" }, { "category": "external", "summary": "2097216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097216" }, { "category": "external", "summary": "2097287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097287" }, { "category": "external", "summary": "2097305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097305" }, { "category": "external", "summary": "2098121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098121" }, { "category": "external", "summary": "2098261", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098261" }, { "category": "external", "summary": "2098536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098536" }, { "category": "external", "summary": "2099265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099265" }, { "category": "external", "summary": "2099581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099581" }, { "category": "external", "summary": "2099609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099609" }, { "category": "external", "summary": "2099646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099646" }, { "category": "external", "summary": "2099660", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099660" }, { "category": "external", "summary": "2099724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099724" }, { "category": "external", "summary": "2099965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099965" }, { "category": "external", "summary": "2100326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100326" }, { "category": "external", "summary": "2100352", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100352" }, { "category": "external", "summary": "2100946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100946" }, { "category": "external", "summary": "2101139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101139" }, { "category": "external", "summary": "2101380", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101380" }, { "category": "external", "summary": "2103818", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2103818" }, { "category": "external", "summary": "2104833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104833" }, { "category": "external", "summary": "2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6156.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, \u0026 bugfix update", "tracking": { "current_release_date": "2024-12-18T00:35:07+00:00", "generator": { "date": "2024-12-18T00:35:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6156", "initial_release_date": "2022-08-24T13:45:52+00:00", "revision_history": [ { "date": "2022-08-24T13:45:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-24T13:45:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-18T00:35:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHODF 4.11 for RHEL 8", "product": { "name": "RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.11::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "product": { "name": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "product_id": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "product": { "name": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "product_id": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.11.0-30" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "product": { "name": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "product_id": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "product": { "name": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "product_id": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.11.0-28" } } }, { "category": "product_version", "name": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "product": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "product_id": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel8\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "product_id": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.11.0-66" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "product": { "name": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "product_id": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "product": { "name": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "product_id": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.11.0-67" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "product": { "name": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "product_id": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.11.0-51" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.11.0-37" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "product_id": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.11.0-39" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "product": { "name": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "product_id": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.11.0-29" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "product": { "name": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "product_id": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "product": { "name": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "product_id": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "product_id": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.11.0-24" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "product_id": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "product_id": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "product": { "name": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "product_id": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "product_id": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a?arch=s390x\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.11.0-13" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "product": { "name": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "product_id": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "product": { "name": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "product_id": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.11.0-30" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "product": { "name": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "product_id": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "product": { "name": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "product_id": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.11.0-28" } } }, { "category": "product_version", "name": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "product": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "product_id": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel8\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "product_id": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.11.0-66" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "product": { "name": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "product_id": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "product": { "name": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "product_id": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.11.0-67" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "product": { "name": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "product_id": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.11.0-51" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.11.0-37" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "product_id": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.11.0-39" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "product": { "name": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "product_id": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.11.0-29" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "product": { "name": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "product_id": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "product": { "name": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "product_id": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "product_id": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.11.0-24" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "product_id": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "product_id": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "product": { "name": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "product_id": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "product_id": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.11.0-13" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "product": { "name": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "product_id": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "product_identification_helper": { "purl": "pkg:oci/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "product": { "name": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "product_id": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel8\u0026tag=v4.11.0-30" } } }, { "category": "product_version", "name": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "product": { "name": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "product_id": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "product": { "name": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "product_id": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "product_identification_helper": { "purl": "pkg:oci/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel8-operator\u0026tag=v4.11.0-28" } } }, { "category": "product_version", "name": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "product": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "product_id": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel8\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "product": { "name": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "product_id": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-must-gather-rhel8\u0026tag=v4.11.0-66" } } }, { "category": "product_version", "name": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "product": { "name": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "product_id": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "product": { "name": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "product_id": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "product_identification_helper": { "purl": "pkg:oci/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel8-operator\u0026tag=v4.11.0-67" } } }, { "category": "product_version", "name": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "product": { "name": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "product_id": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel8\u0026tag=v4.11.0-51" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "product": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "product_id": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "product": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "product_id": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel8-operator\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "product": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "product_id": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel8\u0026tag=v4.11.0-23" } } }, { "category": "product_version", "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "product": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "product_id": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-must-gather-rhel8\u0026tag=v4.11.0-37" } } }, { "category": "product_version", "name": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "product": { "name": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "product_id": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "product": { "name": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "product_id": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-lvm-rhel8-operator\u0026tag=v4.11.0-39" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "product": { "name": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "product_id": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel8\u0026tag=v4.11.0-45" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "product": { "name": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "product_id": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "product": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "product_id": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel8-operator\u0026tag=v4.11.0-29" } } }, { "category": "product_version", "name": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "product": { "name": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "product_id": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "product": { "name": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "product_id": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "product": { "name": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "product_id": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "product_identification_helper": { "purl": "pkg:oci/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-topolvm-rhel8\u0026tag=v4.11.0-24" } } }, { "category": "product_version", "name": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "product": { "name": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "product_id": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "product": { "name": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "product_id": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.11.0-137" } } }, { "category": "product_version", "name": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "product": { "name": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "product_id": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "product_identification_helper": { "purl": "pkg:oci/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel8-operator\u0026tag=v4.11.0-27" } } }, { "category": "product_version", "name": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "product": { "name": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "product_id": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "product_identification_helper": { "purl": "pkg:oci/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel8-operator\u0026tag=v4.11.0-49" } } }, { "category": "product_version", "name": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "product": { "name": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "product_id": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "product_identification_helper": { "purl": "pkg:oci/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319?arch=amd64\u0026repository_url=registry.redhat.io/odf4/volume-replication-rhel8-operator\u0026tag=v4.11.0-13" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x" }, "product_reference": "odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64" }, "product_reference": "odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le" }, "product_reference": "odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64" }, "product_reference": "odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x" }, "product_reference": "odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" }, "product_reference": "odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le" }, "product_reference": "odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64" }, "product_reference": "odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x" }, "product_reference": "odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64" }, "product_reference": "odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x" }, "product_reference": "odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le" }, "product_reference": "odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64" }, "product_reference": "odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x" }, "product_reference": "odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64" }, "product_reference": "odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x" }, "product_reference": "odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le" }, "product_reference": "odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x" }, "product_reference": "odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64" }, "product_reference": "odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le" }, "product_reference": "odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" }, "product_reference": "odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64" }, "product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64" }, "product_reference": "odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le" }, "product_reference": "odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x" }, "product_reference": "odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64" }, "product_reference": "odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64" }, "product_reference": "odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64" }, "product_reference": "odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le" }, "product_reference": "odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x" }, "product_reference": "odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le" }, "product_reference": "odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le" }, "product_reference": "odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le" }, "product_reference": "odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64" }, "product_reference": "odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x" }, "product_reference": "odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64" }, "product_reference": "odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x" }, "product_reference": "odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le" }, "product_reference": "odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64" }, "product_reference": "odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le" }, "product_reference": "odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" }, "product_reference": "odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x" }, "product_reference": "odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64" }, "product_reference": "odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" }, "product_reference": "odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" }, "product_reference": "odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" }, "product_reference": "odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64", "relates_to_product_reference": "8Base-RHODF-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-23440", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-09-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004944" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability in nodejs-set-value can lead to a bypass of CVE-2019-10747. If the user-provided keys used in the path parameter are arrays, the function mixin-deep can be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype, or _proto_ payloads. This vulnerability can impact data confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-set-value: type confusion allows bypass of CVE-2019-10747", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23440" }, { "category": "external", "summary": "RHBZ#2004944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23440" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-4jqc-8m5r-9rpr", "url": "https://github.com/advisories/GHSA-4jqc-8m5r-9rpr" } ], "release_date": "2021-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-set-value: type confusion allows bypass of CVE-2019-10747" }, { "cve": "CVE-2021-23566", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-04T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050853" } ], "notes": [ { "category": "description", "text": "A flaw was found in the nanoid library where the valueOf() function allows the reproduction of the last id generated. This flaw allows an attacker to expose sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "nanoid: Information disclosure via valueOf() function", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23566" }, { "category": "external", "summary": "RHBZ#2050853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050853" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23566", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23566" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-qrpm-p2h7-hrv2", "url": "https://github.com/advisories/GHSA-qrpm-p2h7-hrv2" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nanoid: Information disclosure via valueOf() function" }, { "cve": "CVE-2022-0235", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2022-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044591" } ], "notes": [ { "category": "description", "text": "A flaw was found in node-fetch. When following a redirect to a third-party domain, node-fetch was forwarding sensitive headers such as \"Authorization,\" \"WWW-Authenticate,\" and \"Cookie\" to potentially untrusted targets. This flaw leads to the exposure of sensitive information to an unauthorized actor.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-fetch: exposure of sensitive information to an unauthorized actor", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for dotnet-5.0. For more information about Dotnet product support scope, please see https://access.redhat.com/support/policy/updates/net-core", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0235" }, { "category": "external", "summary": "RHBZ#2044591", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044591" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0235" }, { "category": "external", "summary": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/", "url": "https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7/" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-fetch: exposure of sensitive information to an unauthorized actor" }, { "cve": "CVE-2022-0536", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2022-02-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053259" } ], "notes": [ { "category": "description", "text": "A flaw was found in the follow-redirects package. This flaw allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol. This issue happens with an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle (MITM) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0536" }, { "category": "external", "summary": "RHBZ#2053259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0536" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "follow-redirects: Exposure of Sensitive Information via Authorization Header leak" }, { "cve": "CVE-2022-1650", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-05-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085307" } ], "notes": [ { "category": "description", "text": "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user\u0027s credentials and then use the credentials to access the legitimate website.", "title": "Vulnerability description" }, { "category": "summary", "text": "eventsource: Exposure of Sensitive Information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1650" }, { "category": "external", "summary": "RHBZ#2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650" }, { "category": "external", "summary": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", "url": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eventsource: Exposure of Sensitive Information" }, { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" }, { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24771", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067387" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestAlgorithm structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24771" }, { "category": "external", "summary": "RHBZ#2067387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24771", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24771" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery" }, { "cve": "CVE-2022-24772", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067458" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge package. This signature verification leniency allows an attacker to forge a signature.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects the DigestInfo ASN.1 structure.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24772" }, { "category": "external", "summary": "RHBZ#2067458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24772" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery" }, { "cve": "CVE-2022-24773", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-03-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2067461" } ], "notes": [ { "category": "description", "text": "A flaw was found in the node-forge library when verifying the signature on the ASN.1 structure in RSA PKCS#1 v1.5. This flaw allows an attacker to obtain successful verification for invalid DigestInfo structure, affecting the integrity of the attacked resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "node-forge: Signature verification leniency in checking `DigestInfo` structure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24773" }, { "category": "external", "summary": "RHBZ#2067461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24773" }, { "category": "external", "summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr", "url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr" } ], "release_date": "2022-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "node-forge: Signature verification leniency in checking `DigestInfo` structure" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-29810", "cwe": { "id": "CWE-532", "name": "Insertion of Sensitive Information into Log File" }, "discovery_date": "2022-04-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2080279" } ], "notes": [ { "category": "description", "text": "A flaw was found in go-getter, where the go-getter library can write SSH credentials into its log file. This flaw allows a local user with access to read log files to read sensitive credentials, which may lead to privilege escalation or account takeover.", "title": "Vulnerability description" }, { "category": "summary", "text": "go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29810" }, { "category": "external", "summary": "RHBZ#2080279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080279" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29810", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29810" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29810", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29810" }, { "category": "external", "summary": "https://github.com/golang/vulndb/issues/438", "url": "https://github.com/golang/vulndb/issues/438" } ], "release_date": "2022-04-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses" }, { "cve": "CVE-2022-31129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2105075" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Moment.js package. Users who pass user-provided strings without sanity length checks to the moment constructor are vulnerable to regular expression denial of service (ReDoS) attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "moment: inefficient parsing algorithm resulting in DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Fuse provides the affected software but does not use the functionality and as such its impact has been downgraded to Low.\n\nRed Hat Advanced Cluster Management for Kubernetes (RHACM) ships a vulnerable version of the moment library. However, this affected functionality is restricted behind OAuth, reducing the impact to Moderate.\n\nRed Hat Satellite ships a vulnerable version of the moment library. However, this only affects a specific component (qpid-dispatch), reducing the impact to Moderate.\n\nRed Hat Ceph Storage (RHCS) ships a vulnerable version of the moment library, however, it is not directly used and is a transitive dependency from Angular. In addition, the impact would only be to the grafana browser, and not the underlying RHCS system, which reduces the impact to Moderate. \n\nRed Hat OpenShift Service Mesh (OSSM) ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nRed Hat OpenShift distributed tracing ships a vulnerable version of the moment library, however, it is not directly used, and as such, the impact has been lowered to Moderate.\n\nIn Logging Subsystem for Red Hat OpenShift the vulnerable moment nodejs package is bundled in the ose-logging-kibana6 container as a transitive dependency, hence the direct impact is reduced to Moderate.\n\nIn OpenShift Container Platform 4 the vulnerabile moment package is a third party dependency, hence the direct impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "known_not_affected": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31129" }, { "category": "external", "summary": "RHBZ#2105075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105075" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31129" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g", "url": "https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g" } ], "release_date": "2022-07-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:45:52+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6156" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:3f7fbeb56a29d3e23855368a1fca0cf86d055e4d9ff0fe387eae1ae3bf266056_s390x", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:b795c0b44236237d5efca90eb9e2786a9b3e82968d5022eaed8848c7f49bb38d_amd64", "8Base-RHODF-4.11:odf4/cephcsi-rhel8@sha256:c45d178764106cb22cdc5f9adb354ea11211712e5be93b7a067d28f410067f0c_ppc64le", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:25e9cf317088b7a827629cb40ee7f816994b465e86f3b2df5a97931cfa4eb40d_amd64", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:ab449f9f9aa1df48e076c283b19f32361ee5d531ffe13922401107095814708d_s390x", "8Base-RHODF-4.11:odf4/mcg-core-rhel8@sha256:d675998c5c475f799e937a3f90e59813d583e8f84a7f6759298ba92e50a9c288_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:0595b90d21f7a5a0ea91a11492f1dbfbe2759ecd9707a8e9e4953d57c973f801_ppc64le", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:4c9db259686a6de3247892d1ec915d185d5276e0d4de3545e4cf81ec8310c87d_amd64", "8Base-RHODF-4.11:odf4/mcg-operator-bundle@sha256:645eaf6f2412322d28789021b9393fb368156c4f2aa14528fe9209e3c22fe475_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:257eb2ca9f59ff15db9018038422382a6887b82c603515cd1b2b12781fbb189a_ppc64le", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:8d7d066a645cade7d01ecd3d0427cbadca889dc8c1a3ffde1f4193b777975c75_s390x", "8Base-RHODF-4.11:odf4/mcg-rhel8-operator@sha256:fc2c495c5236268e095265dd202587ab7bcf376b14a1e4d05875f5e053635cb0_amd64", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:261691407d9e36597d6de3fb2d7707f78ea9cdd91f6f674f86cfd9727c3ce739_s390x", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:6e447521417d9331f471ed77645354406adf47b94497c5f8f13a8966e6534cec_ppc64le", "8Base-RHODF-4.11:odf4/ocs-metrics-exporter-rhel8@sha256:9068cccd15cbe2c2c36c4a5633f704616653dc735256d78f588ec6e2b7e1e612_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:012fcf6f037110f56be4a72bb48ede013b764a0ee4615718d985397cafe11129_ppc64le", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:83b0764e21d3a1d2b4efe26bed9a3fdfe4b370ec9f7c4e2bf9cee44a9c33c5bb_amd64", "8Base-RHODF-4.11:odf4/ocs-must-gather-rhel8@sha256:8d177becb51a16957264e508d623fa2c0f11505b3819b306f39da154db947d91_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:088b8dc1d459270629610aab02666f99262c9675336d812b24e43df135d9e96a_amd64", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:0f61780f3b698672e76029d705abd69349cd01782626f66e9fd029be71b9c336_s390x", "8Base-RHODF-4.11:odf4/ocs-operator-bundle@sha256:4506d1dc937411d88d435e23b7bfd17cc48d04e237f697f0cb8d9da6c4b3daf4_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:57947da5535936416a10a9de871aa37dd69e157b762577ba30b7f8d1332eb644_amd64", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:717c291c0eae097da0432f36efc4c070c9e1fc3824344ad6ccac254a720fac05_ppc64le", "8Base-RHODF-4.11:odf4/ocs-rhel8-operator@sha256:ebe1cd859b8483554955c12229be987622825fb292f522a50e2d8c289c53cd65_s390x", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:a5fa14675b15c4e59ab9717051e3de0692e36baab909af1409075c7e85402c26_amd64", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:aa873670a03cda9fb7a56130f0be4f827dafe4aba7d00833f7020f8ce0a978ae_ppc64le", "8Base-RHODF-4.11:odf4/odf-console-rhel8@sha256:e7055ac1518d19cd288af0a829f8e28fd1eef92e3e03044225b4c9b204e4d1e8_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:4776158851b33c146ef13f861d59db2340e74f86c35dfc6ab08f2fb7e2455a3b_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:74a8060b385b219f44eca200ca1e9e59006ea65fa8b3179b82511ccf94109134_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-operator-bundle@sha256:d969a8b0b2871ada6387543aef2482f42e8d7572da48f143e0ef3b66a1916cf5_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:055c71b5a6ae1a4ba5865dc6fca134523a793b30b1183da4ae318895692c5075_ppc64le", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:58ce943524354477e5c7792b9976aee14bc5589eeed4f8c9f891a4669620d0a5_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-rhel8-operator@sha256:bdafb62d8443db185ee2b766a4dcfef5fe38b8cade9f8ae19b736e9041fc5aea_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:0b9ecf62630f7ec27789275d02559675f58ed8efb9021f3af2031fde0a09fe6a_amd64", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:3ddf8e31f143ae15205e149921189fb3ea078064bfc1f059bfa0be4f6682a411_s390x", "8Base-RHODF-4.11:odf4/odf-csi-addons-sidecar-rhel8@sha256:6789e86605df10211bf7b0c51d89331164b8904002a84d846f02ae1f07b02de5_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b2104f1c1ea290abe89d5079a67f6adb6ecfa0fee06b87f907e51ae9ae09f1ce_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:b5eb82998b58c69f3b86dbd8422b0b3d539f9f7f6e41487087c5eae2e31978b2_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-must-gather-rhel8@sha256:c54add471c2ba0d6c6ae845908879a469fa4d51cfc03b5d824890464357410dc_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:1565dfca546929367e38ef7a9177485ddc330e07740fe05759312d8ffda1e5ed_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:ef8c8b736d860519a8d2dc9e53c932e49897c9865c11f55d00fc53c1c6b6b5be_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-operator-bundle@sha256:f25a6bce26e7464a67d77f8a598c5935ea81e125ae8e6cccaacb8b1ffc6b15f9_amd64", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:7af78e53c59a9113d7dbf0032acd27800c8e20a45f0558cfa19b75d992b2226c_s390x", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:a9403dfbec7706ddb25c1c10351676f90508f1961799cb5e5ad105f012f1165a_ppc64le", "8Base-RHODF-4.11:odf4/odf-lvm-rhel8-operator@sha256:f13ed10fbb0c41c29af589134a0b1dcf940014711c181d3042686ec19032da10_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:363a523bcadfe94232264b87d484feee2bed956a578a442bcfcb9eb424fbca28_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:647b2c224070a0b32a8c9ea1ed0d6ebe78a0a73f064187e99c2d995bfe3c75fb_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-console-rhel8@sha256:71732a5f18f3020ed202f295dd06f7da56fd4c12e44663fb00ae76535bae11a5_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:30fadecc3fc709d2b63ba88f66abcf8b4a2912dd43a99025211391961c7c4899_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:6744d76335628f60d980b40c01997392835e5543f6ccd18b83fadb25c62d939f_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-operator-bundle@sha256:95bddcca209809635cf3f25a9f03f65bd6500b32eca6d77047627b421cf5c733_ppc64le", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:46a6ff2d2f0510628d6307773c800e7c8a9f7ba4f023493c9431307ba2432f9a_s390x", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:4ddf48a5670e1822b2013503cfb4bc9fb92164d3fe38d2f933bbb24b7417380f_amd64", "8Base-RHODF-4.11:odf4/odf-multicluster-rhel8-operator@sha256:95aee2ec39f6dd03a66655251063d3babad72422264b41139b0ee68f78cc9077_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:2dd1aa2a2abcbda0d921aaad29db55ae40a5869b62c7e14e5bd2ff71dc647c09_ppc64le", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:45695f266a4b31df6805ab24977e490f8d71b0e32ff4dfb2e0b397c66de66b21_amd64", "8Base-RHODF-4.11:odf4/odf-operator-bundle@sha256:bb65d8368da1cde5bccc7cfc2a9325c3357fb6f9701ccdee1b10252e2f23f6f0_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:007fa00f8c6cebc70ca122b2bd42b2833bfbd8990a377f297f3baab264410f6b_amd64", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:67e58a5edb0c3f482254eaa84b70b85e143fd80bedab32207b78e453e64ef1e6_s390x", "8Base-RHODF-4.11:odf4/odf-rhel8-operator@sha256:da3013f2a8d13db71e80f7085b69f1bf9f5e518d94eadf1204b431af4dc989f4_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:1240938e119303864ba4b6ad342beec13cced941a7ddb08f6003afebead9e88f_s390x", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:175337b3cba8447d0e8a05585faf4609cab47c4bf53be9bf6a2df05b8fa80ffa_ppc64le", "8Base-RHODF-4.11:odf4/odf-topolvm-rhel8@sha256:e0320e6557c1437af33a841b18ba70f4c2f0552b70180ba8b180c123d7f2f4f2_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:6aaa2a3d22794a96700450e25dcb873f3d4524ef901a023698f5728c5ca21800_amd64", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:d630da32e1e6c35a11ceb493fd7462b08fc27789fe0e0837cd7f5840a13bab44_s390x", "8Base-RHODF-4.11:odf4/odr-cluster-operator-bundle@sha256:eeda649c14488b6c57fc55af14b07e04173524bd7bc3b37e85ce2eaba50393dd_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:4186520d7a08afc8facfb6a804ae5e87eb6830d4063376416f87e24cd2f637b6_s390x", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:aacaa2b2c859b007212ecfdd2ea9fcbe152f293ea3f688e7e0a6316e1a8d04eb_ppc64le", "8Base-RHODF-4.11:odf4/odr-hub-operator-bundle@sha256:f5fc8d49a34bbcb6e18985593cb7f6ced9a4a81cb2d5dcc3207464f4eec8afe6_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:1f4065509ed12724f26b3ae5541f5e39bb9880b8d38f487b54db004d4cfedc54_s390x", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:66c69af462e5241eadc9e19cf2896f0986a423513b3b7f33228602038047d93e_amd64", "8Base-RHODF-4.11:odf4/odr-rhel8-operator@sha256:f647abc5dec4edada3f6d2db3d50b38ff90fc8a259d67465603a5f2fb40287c9_ppc64le", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:2e8b52f2f4eda1e7ea4ff737a9a5a839de25c378060237d1c35ca06ef1832b3c_s390x", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:5dea95a7f7ddc016993439441d53ed2ea553d2fabe3662a3f752c5c7ec0e5d64_amd64", "8Base-RHODF-4.11:odf4/rook-ceph-rhel8-operator@sha256:ede9a7e533fab96106afc33078b45785adc955aa43e2529b933164e0c14e74f2_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:57980c6f7c978f4062455c5d69aa430ad2ba2e00c1410076f4f2880c08e41393_ppc64le", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:b29e58dac60a544d740856b60266b9540e35a5e11aab859d89801ea34bc2c86a_s390x", "8Base-RHODF-4.11:odf4/volume-replication-rhel8-operator@sha256:c09762cf6683233431900504dc8b74962a652e3736d44502dc6970f59a540319_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "moment: inefficient parsing algorithm resulting in DoS" } ] }
rhsa-2022_5799
Vulnerability from csaf_redhat
Published
2022-08-01 16:07
Modified
2024-12-17 21:59
Summary
Red Hat Security Advisory: go-toolset and golang security and bug fix update
Notes
Topic
An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
The golang packages provide the Go programming language compiler.
Security Fix(es):
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Clean up dist-git patches (BZ#2109174)
* Update Go to version 1.17.12 (BZ#2109183)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. \n\nThe golang packages provide the Go programming language compiler.\n\nSecurity Fix(es):\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\n\n* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n\n* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Clean up dist-git patches (BZ#2109174)\n\n* Update Go to version 1.17.12 (BZ#2109183)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5799", "url": "https://access.redhat.com/errata/RHSA-2022:5799" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5799.json" } ], "title": "Red Hat Security Advisory: go-toolset and golang security and bug fix update", "tracking": { "current_release_date": "2024-12-17T21:59:13+00:00", "generator": { "date": "2024-12-17T21:59:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5799", "initial_release_date": "2022-08-01T16:07:42+00:00", "revision_history": [ { "date": "2022-08-01T16:07:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-01T16:07:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:59:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.17.12-1.el9_0.src", "product": { "name": "golang-0:1.17.12-1.el9_0.src", "product_id": "golang-0:1.17.12-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.12-1.el9_0?arch=src" } } }, { "category": "product_version", "name": "go-toolset-0:1.17.12-1.el9_0.src", "product": { "name": "go-toolset-0:1.17.12-1.el9_0.src", "product_id": "go-toolset-0:1.17.12-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.12-1.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.17.12-1.el9_0.aarch64", "product": { "name": "golang-0:1.17.12-1.el9_0.aarch64", "product_id": "golang-0:1.17.12-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.12-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.12-1.el9_0.aarch64", "product": { "name": "golang-bin-0:1.17.12-1.el9_0.aarch64", "product_id": "golang-bin-0:1.17.12-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.12-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "go-toolset-0:1.17.12-1.el9_0.aarch64", "product": { "name": "go-toolset-0:1.17.12-1.el9_0.aarch64", "product_id": "go-toolset-0:1.17.12-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.12-1.el9_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.17.12-1.el9_0.ppc64le", "product": { "name": "golang-0:1.17.12-1.el9_0.ppc64le", "product_id": "golang-0:1.17.12-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.12-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.12-1.el9_0.ppc64le", "product": { "name": "golang-bin-0:1.17.12-1.el9_0.ppc64le", "product_id": "golang-bin-0:1.17.12-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.12-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "go-toolset-0:1.17.12-1.el9_0.ppc64le", "product": { "name": "go-toolset-0:1.17.12-1.el9_0.ppc64le", "product_id": "go-toolset-0:1.17.12-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.12-1.el9_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.17.12-1.el9_0.x86_64", "product": { "name": "golang-0:1.17.12-1.el9_0.x86_64", "product_id": "golang-0:1.17.12-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.12-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.12-1.el9_0.x86_64", "product": { "name": "golang-bin-0:1.17.12-1.el9_0.x86_64", "product_id": "golang-bin-0:1.17.12-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.12-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "golang-race-0:1.17.12-1.el9_0.x86_64", "product": { "name": "golang-race-0:1.17.12-1.el9_0.x86_64", "product_id": "golang-race-0:1.17.12-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-race@1.17.12-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "go-toolset-0:1.17.12-1.el9_0.x86_64", "product": { "name": "go-toolset-0:1.17.12-1.el9_0.x86_64", "product_id": "go-toolset-0:1.17.12-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.12-1.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "golang-0:1.17.12-1.el9_0.s390x", "product": { "name": "golang-0:1.17.12-1.el9_0.s390x", "product_id": "golang-0:1.17.12-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang@1.17.12-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "golang-bin-0:1.17.12-1.el9_0.s390x", "product": { "name": "golang-bin-0:1.17.12-1.el9_0.s390x", "product_id": "golang-bin-0:1.17.12-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-bin@1.17.12-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "go-toolset-0:1.17.12-1.el9_0.s390x", "product": { "name": "go-toolset-0:1.17.12-1.el9_0.s390x", "product_id": "go-toolset-0:1.17.12-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/go-toolset@1.17.12-1.el9_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "golang-docs-0:1.17.12-1.el9_0.noarch", "product": { "name": "golang-docs-0:1.17.12-1.el9_0.noarch", "product_id": "golang-docs-0:1.17.12-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-docs@1.17.12-1.el9_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-misc-0:1.17.12-1.el9_0.noarch", "product": { "name": "golang-misc-0:1.17.12-1.el9_0.noarch", "product_id": "golang-misc-0:1.17.12-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-misc@1.17.12-1.el9_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-src-0:1.17.12-1.el9_0.noarch", "product": { "name": "golang-src-0:1.17.12-1.el9_0.noarch", "product_id": "golang-src-0:1.17.12-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-src@1.17.12-1.el9_0?arch=noarch" } } }, { "category": "product_version", "name": "golang-tests-0:1.17.12-1.el9_0.noarch", "product": { "name": "golang-tests-0:1.17.12-1.el9_0.noarch", "product_id": "golang-tests-0:1.17.12-1.el9_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/golang-tests@1.17.12-1.el9_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.12-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64" }, "product_reference": "go-toolset-0:1.17.12-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.12-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le" }, "product_reference": "go-toolset-0:1.17.12-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.12-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x" }, "product_reference": "go-toolset-0:1.17.12-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.12-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src" }, "product_reference": "go-toolset-0:1.17.12-1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "go-toolset-0:1.17.12-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" }, "product_reference": "go-toolset-0:1.17.12-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.12-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64" }, "product_reference": "golang-0:1.17.12-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.12-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le" }, "product_reference": "golang-0:1.17.12-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.12-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x" }, "product_reference": "golang-0:1.17.12-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.12-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src" }, "product_reference": "golang-0:1.17.12-1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-0:1.17.12-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64" }, "product_reference": "golang-0:1.17.12-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.12-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64" }, "product_reference": "golang-bin-0:1.17.12-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.12-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le" }, "product_reference": "golang-bin-0:1.17.12-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.12-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x" }, "product_reference": "golang-bin-0:1.17.12-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-bin-0:1.17.12-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64" }, "product_reference": "golang-bin-0:1.17.12-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-docs-0:1.17.12-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch" }, "product_reference": "golang-docs-0:1.17.12-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-misc-0:1.17.12-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch" }, "product_reference": "golang-misc-0:1.17.12-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-race-0:1.17.12-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64" }, "product_reference": "golang-race-0:1.17.12-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-src-0:1.17.12-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch" }, "product_reference": "golang-src-0:1.17.12-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "golang-tests-0:1.17.12-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" }, "product_reference": "golang-tests-0:1.17.12-1.el9_0.noarch", "relates_to_product_reference": "AppStream-9.0.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "known_not_affected": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-01T16:07:42+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5799" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:go-toolset-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.src", "AppStream-9.0.0.Z.MAIN.EUS:golang-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.aarch64", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.ppc64le", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.s390x", "AppStream-9.0.0.Z.MAIN.EUS:golang-bin-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-docs-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-misc-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-race-0:1.17.12-1.el9_0.x86_64", "AppStream-9.0.0.Z.MAIN.EUS:golang-src-0:1.17.12-1.el9_0.noarch", "AppStream-9.0.0.Z.MAIN.EUS:golang-tests-0:1.17.12-1.el9_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" } ] }
rhsa-2023_3642
Vulnerability from csaf_redhat
Published
2023-06-15 15:59
Modified
2024-12-17 22:21
Summary
Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update
Notes
Topic
A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.
This new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9.
Security Fix(es):
* crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements (CVE-2022-41912)
* eventsource: Exposure of Sensitive Information (CVE-2022-1650)
* grafana: stored XSS vulnerability (CVE-2022-31097)
* grafana: OAuth account takeover (CVE-2022-31107)
* ramda: prototype poisoning (CVE-2021-42581)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
* marked: regular expression block.def may lead Denial of Service (CVE-2022-21680)
* marked: regular expression inline.reflinkSearch may lead Denial of Service (CVE-2022-21681)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* Moment.js: Path traversal in moment.locale (CVE-2022-24785)
* grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix (CVE-2022-26148)
* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* grafana: plugin signature bypass (CVE-2022-31123)
* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)
* grafana: Escalation from admin to server admin when auth proxy is used (CVE-2022-35957)
* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)
* grafana: using email as a username can block other users from signing in (CVE-2022-39229)
* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)
* grafana: User enumeration via forget password (CVE-2022-39307)
* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:
https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index
All users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides numerous enhancements and bug fixes.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A new container image for Red Hat Ceph Storage 6.1 is now available in the Red Hat Ecosystem Catalog.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Ceph Storage is a scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment utilities, and support services.\n\nThis new container image is based on Red Hat Ceph Storage 6.1 and Red Hat Enterprise Linux 9.\n\nSecurity Fix(es):\n\n* crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements (CVE-2022-41912)\n\n* eventsource: Exposure of Sensitive Information (CVE-2022-1650)\n\n* grafana: stored XSS vulnerability (CVE-2022-31097)\n\n* grafana: OAuth account takeover (CVE-2022-31107)\n\n* ramda: prototype poisoning (CVE-2021-42581)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* marked: regular expression block.def may lead Denial of Service (CVE-2022-21680)\n\n* marked: regular expression inline.reflinkSearch may lead Denial of Service (CVE-2022-21681)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix (CVE-2022-26148)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n\n* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n\n* grafana: plugin signature bypass (CVE-2022-31123)\n\n* grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins (CVE-2022-31130)\n\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* grafana: Escalation from admin to server admin when auth proxy is used (CVE-2022-35957)\n\n* grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins (CVE-2022-39201)\n\n* grafana: using email as a username can block other users from signing in (CVE-2022-39229)\n\n* grafana: email addresses and usernames cannot be trusted (CVE-2022-39306)\n\n* grafana: User enumeration via forget password (CVE-2022-39307)\n\n* grafana: Spoofing of the originalUrl parameter of snapshots (CVE-2022-39324)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nSpace precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Ceph Storage Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index\n\nAll users of Red Hat Ceph Storage are advised to pull these new images from the Red Hat Ecosystem catalog, which provides numerous enhancements and bug fixes.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3642", "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_ceph_storage/6.1/html/release_notes/index" }, { "category": "external", "summary": "2066563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066563" }, { "category": "external", "summary": "2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2082705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082705" }, { "category": "external", "summary": "2082706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082706" }, { "category": "external", "summary": "2083778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083778" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2104365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104365" }, { "category": "external", "summary": "2104367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104367" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2125514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125514" }, { "category": "external", "summary": "2131146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131146" }, { "category": "external", "summary": "2131147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131147" }, { "category": "external", "summary": "2131148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131148" }, { "category": "external", "summary": "2131149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131149" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2138014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138014" }, { "category": "external", "summary": "2138015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138015" }, { "category": "external", "summary": "2148252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148252" }, { "category": "external", "summary": "2149181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149181" }, { "category": "external", "summary": "2168965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168965" }, { "category": "external", "summary": "2174461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174461" }, { "category": "external", "summary": "2174462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174462" }, { "category": "external", "summary": "2186142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186142" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3642.json" } ], "title": "Red Hat Security Advisory: Red Hat Ceph Storage 6.1 Container security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:21:21+00:00", "generator": { "date": "2024-12-17T22:21:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3642", "initial_release_date": "2023-06-15T15:59:41+00:00", "revision_history": [ { "date": "2023-06-15T15:59:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-06-15T15:59:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:21:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Ceph Storage 6.1 Tools", "product": { "name": "Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools", "product_identification_helper": { "cpe": "cpe:/a:redhat:ceph_storage:6.1::el9" } } } ], "category": "product_family", "name": "Red Hat Ceph Storage" }, { "branches": [ { "category": "product_version", "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "product": { "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-75" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "product": { "name": "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "product_id": "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.4-3" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "product": { "name": "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "product_id": "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-177" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.17-4" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "product_id": "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661?arch=amd64\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-36" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "product": { "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-75" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "product": { "name": "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "product_id": "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.4-3" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "product": { "name": "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "product_id": "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-177" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.17-4" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "product_id": "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676?arch=ppc64le\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-36" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "product": { "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "product_id": "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-dashboard-rhel9\u0026tag=6-75" } } }, { "category": "product_version", "name": "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "product": { "name": "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "product_id": "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "product_identification_helper": { "purl": "pkg:oci/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/keepalived-rhel9\u0026tag=2.2.4-3" } } }, { "category": "product_version", "name": "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "product": { "name": "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "product_id": "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-promtail-rhel9\u0026tag=v2.4.0-5" } } }, { "category": "product_version", "name": "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "product": { "name": "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "product_id": "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-6-rhel9\u0026tag=6-177" } } }, { "category": "product_version", "name": "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "product": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "product_id": "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "product_identification_helper": { "purl": "pkg:oci/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/rhceph-haproxy-rhel9\u0026tag=2.4.17-4" } } }, { "category": "product_version", "name": "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", "product": { "name": "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", "product_id": "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", "product_identification_helper": { "purl": "pkg:oci/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf?arch=s390x\u0026repository_url=registry.redhat.io/rhceph/snmp-notifier-rhel9\u0026tag=1.2.1-36" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x" }, "product_reference": "rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le" }, "product_reference": "rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64" }, "product_reference": "rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64" }, "product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x" }, "product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" }, "product_reference": "rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x" }, "product_reference": "rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64" }, "product_reference": "rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le" }, "product_reference": "rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x" }, "product_reference": "rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le" }, "product_reference": "rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64 as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" }, { "category": "default_component_of", "full_product_name": { "name": "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x as a component of Red Hat Ceph Storage 6.1 Tools", "product_id": "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" }, "product_reference": "rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x", "relates_to_product_reference": "9Base-RHCEPH-6.1-Tools" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-42581", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-05-10T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2083778" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Ramda NPM package that involves prototype poisoning. This flaw allows attackers to supply a crafted object, affecting the integrity or availability of the application.", "title": "Vulnerability description" }, { "category": "summary", "text": "ramda: prototype poisoning", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected components are the application-ui container up to and including RHACM 2.4.4, 2.3.10 and 2.2.13 and grc-ui container up to and including RHACM 2.2.13 versions. However not any RHACM is affected in the kui-web-terminal container as is using already patched and not affected version, therefore we are not impacted in this particular component. In RHACM these components are behind OpenShift OAuth. This restricts access to the vulnerable ramda library to authenticated users only, therefore the impact is reduced to Moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42581" }, { "category": "external", "summary": "RHBZ#2083778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42581", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42581" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42581", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42581" }, { "category": "external", "summary": "https://github.com/ramda/ramda/pull/3192", "url": "https://github.com/ramda/ramda/pull/3192" } ], "release_date": "2022-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ramda: prototype poisoning" }, { "cve": "CVE-2022-1650", "cwe": { "id": "CWE-359", "name": "Exposure of Private Personal Information to an Unauthorized Actor" }, "discovery_date": "2022-05-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2085307" } ], "notes": [ { "category": "description", "text": "A flaw was found in the EventSource NPM Package. The description from the source states the following message: \"Exposure of Sensitive Information to an Unauthorized Actor.\" This flaw allows an attacker to steal the user\u0027s credentials and then use the credentials to access the legitimate website.", "title": "Vulnerability description" }, { "category": "summary", "text": "eventsource: Exposure of Sensitive Information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1650" }, { "category": "external", "summary": "RHBZ#2085307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085307" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1650" }, { "category": "external", "summary": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e", "url": "https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e" } ], "release_date": "2022-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "eventsource: Exposure of Sensitive Information" }, { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-21680", "cwe": { "id": "CWE-186", "name": "Overly Restrictive Regular Expression" }, "discovery_date": "2022-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082705" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "marked: regular expression block.def may lead Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21680" }, { "category": "external", "summary": "RHBZ#2082705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082705" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21680", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21680" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21680", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21680" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "marked: regular expression block.def may lead Denial of Service" }, { "cve": "CVE-2022-21681", "cwe": { "id": "CWE-186", "name": "Overly Restrictive Regular Expression" }, "discovery_date": "2022-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the markedjs package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "marked: regular expression inline.reflinkSearch may lead Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21681" }, { "category": "external", "summary": "RHBZ#2082706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21681", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21681" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21681", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21681" } ], "release_date": "2022-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "marked: regular expression inline.reflinkSearch may lead Denial of Service" }, { "cve": "CVE-2022-23498", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-02-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167266" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Grafana package. When data-source query caching is enabled, Grafana caches all headers, including `grafana_session.` As a result, any user that queries a data source where the caching is enabled can acquire another user\u2019s session.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: Use of Cache Containing Sensitive Information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23498" }, { "category": "external", "summary": "RHBZ#2167266", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167266" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23498", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23498" }, { "category": "external", "summary": "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-2j8f-6whh-frc8" } ], "release_date": "2023-02-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "category": "workaround", "details": "To mitigate the vulnerability, disable the data source query caching for all data sources.", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "grafana: Use of Cache Containing Sensitive Information" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24785", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-04-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072009" } ], "notes": [ { "category": "description", "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "Moment.js: Path traversal in moment.locale", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24785" }, { "category": "external", "summary": "RHBZ#2072009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785" }, { "category": "external", "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4", "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4" } ], "release_date": "2022-04-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "category": "workaround", "details": "Sanitize the user-provided locale name before passing it to Moment.js.", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Moment.js: Path traversal in moment.locale" }, { "cve": "CVE-2022-26148", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "discovery_date": "2022-03-22T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2066563" } ], "notes": [ { "category": "description", "text": "A flaw was found in Grafana when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right-click to view the source code and use Ctrl-F to search for the password in api_jsonrpc.php to discover the Zabbix account password and URL address.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26148" }, { "category": "external", "summary": "RHBZ#2066563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26148" } ], "release_date": "2022-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: An information leak issue was discovered in Grafana through 7.3.4, when integrated with Zabbix" }, { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-31097", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2022-07-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104365" } ], "notes": [ { "category": "description", "text": "A Cross-site scripting (XSS) vulnerability was found in the Unified Alerting feature of Grafana. This stored XSS can elevate privileges from Editor to Admin.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: stored XSS vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31097" }, { "category": "external", "summary": "RHBZ#2104365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31097" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31097", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31097" }, { "category": "external", "summary": "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-vw7q-p2qg-4m5f" } ], "release_date": "2022-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "category": "workaround", "details": "Disable Unified alerting.\nhttps://grafana.com/docs/grafana/latest/setup-grafana/configure-grafana/#unified_alerting", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "grafana: stored XSS vulnerability" }, { "acknowledgments": [ { "names": [ "HTTPVoid team" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-31107", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2022-07-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104367" } ], "notes": [ { "category": "description", "text": "A flaw was found in Grafana. This flaw allows a malicious user with the authorization to log into a Grafana instance via a configured OAuth IdP to take over an existing Grafana account under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: OAuth account takeover", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31107" }, { "category": "external", "summary": "RHBZ#2104367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31107", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31107" }, { "category": "external", "summary": "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-mx47-6497-3fv2" } ], "release_date": "2022-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" }, { "category": "workaround", "details": "As a workaround, it is possible to disable any OAuth login or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "grafana: OAuth account takeover" }, { "cve": "CVE-2022-31123", "discovery_date": "2022-09-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2131147" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Grafana web application, where it is possible to install plugins which are not digitally signed. An admin could install unsigned plugins, which may contain malicious code.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: plugin signature bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31123" }, { "category": "external", "summary": "RHBZ#2131147", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131147" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31123", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31123" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31123", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31123" }, { "category": "external", "summary": "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-rhxj-gh46-jvw8" } ], "release_date": "2022-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: plugin signature bypass" }, { "cve": "CVE-2022-31130", "discovery_date": "2022-09-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2131146" } ], "notes": [ { "category": "description", "text": "A flaw was found in Grafana\u0027s use of the GitLab data source plugin, leaking the API key to gitlab. This can result in the destination plugin receiving a Grafana user\u0027s authentication token, which could be used by an attacker.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-31130" }, { "category": "external", "summary": "RHBZ#2131146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-31130", "url": "https://www.cve.org/CVERecord?id=CVE-2022-31130" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-31130", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31130" } ], "release_date": "2022-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: data source and plugin proxy endpoints leaking authentication tokens to some destination plugins" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" }, { "cve": "CVE-2022-32189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2113814" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32189" }, { "category": "external", "summary": "RHBZ#2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189" }, { "category": "external", "summary": "https://go.dev/issue/53871", "url": "https://go.dev/issue/53871" }, { "category": "external", "summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", "url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU" } ], "release_date": "2022-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service" }, { "cve": "CVE-2022-32190", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124668" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/url: JoinPath does not strip relative path components in all circumstances", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32190" }, { "category": "external", "summary": "RHBZ#2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190" }, { "category": "external", "summary": "https://go.dev/issue/54385", "url": "https://go.dev/issue/54385" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/url: JoinPath does not strip relative path components in all circumstances" }, { "cve": "CVE-2022-35957", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2022-09-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2125514" } ], "notes": [ { "category": "description", "text": "A flaw was found in the grafana package. Auth proxy allows authentication of a user by only providing the username (or email) in an X-WEBAUTH-USER HTTP header. The trust assumption is that a front proxy will take care of authentication and that the Grafana server is only publicly reachable with this front proxy.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: Escalation from admin to server admin when auth proxy is used", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-35957" }, { "category": "external", "summary": "RHBZ#2125514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2125514" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-35957", "url": "https://www.cve.org/CVERecord?id=CVE-2022-35957" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-35957", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35957" }, { "category": "external", "summary": "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q", "url": "https://github.com/grafana/grafana/security/advisories/GHSA-ff5c-938w-8c9q" } ], "release_date": "2022-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: Escalation from admin to server admin when auth proxy is used" }, { "cve": "CVE-2022-39201", "discovery_date": "2022-09-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2131148" } ], "notes": [ { "category": "description", "text": "A flaw was found in Grafana. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. Grafana could leak the authentication cookie of users to plugins, which could result in an impact to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-39201" }, { "category": "external", "summary": "RHBZ#2131148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131148" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39201", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39201" } ], "release_date": "2022-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins" }, { "cve": "CVE-2022-39229", "discovery_date": "2022-09-30T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2131149" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Grafana web application. When a user logs into the system, either the username or email address can be used. However, the login system allows both a username and connected email to be registered, which could allow an attacker to prevent a user which has an associated email address access.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: using email as a username can block other users from signing in", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-39229" }, { "category": "external", "summary": "RHBZ#2131149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131149" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39229", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39229" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39229", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39229" } ], "release_date": "2022-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: using email as a username can block other users from signing in" }, { "acknowledgments": [ { "names": [ "Grafana Team" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-39306", "cwe": { "id": "CWE-303", "name": "Incorrect Implementation of Authentication Algorithm" }, "discovery_date": "2022-10-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2138014" } ], "notes": [ { "category": "description", "text": "An authentication bypass flaw was discovered in Grafana. This issue could allow a remote unauthenticated attacker to create an account and provide access to a certain organization, which can be exploited by gaining access to the signup link. The highest impacts to the system are confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: email addresses and usernames cannot be trusted", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-39306" }, { "category": "external", "summary": "RHBZ#2138014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39306", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39306" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39306", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39306" }, { "category": "external", "summary": "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", "url": "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/" } ], "release_date": "2022-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: email addresses and usernames cannot be trusted" }, { "acknowledgments": [ { "names": [ "Grafana Team" ] } ], "cve": "CVE-2022-39307", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-10-26T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2138015" } ], "notes": [ { "category": "description", "text": "An information leak was discovered in Grafana. Remote unauthenticated users could exploit the forget password feature to discover which user accounts exist.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: User enumeration via forget password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-39307" }, { "category": "external", "summary": "RHBZ#2138015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39307" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39307", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39307" }, { "category": "external", "summary": "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/", "url": "https://grafana.com/blog/2022/11/08/security-release-new-versions-of-grafana-with-critical-and-moderate-fixes-for-cve-2022-39328-cve-2022-39307-and-cve-2022-39306/" } ], "release_date": "2022-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: User enumeration via forget password" }, { "acknowledgments": [ { "names": [ "Grafana Security Team" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-39324", "cwe": { "id": "CWE-472", "name": "External Control of Assumed-Immutable Web Parameter" }, "discovery_date": "2022-11-24T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2148252" } ], "notes": [ { "category": "description", "text": "A flaw was found in the grafana package. While creating a snapshot, an attacker may manipulate a hidden HTTP parameter to inject a malicious URL in the \"Open original dashboard\" button.", "title": "Vulnerability description" }, { "category": "summary", "text": "grafana: Spoofing of the originalUrl parameter of snapshots", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Service Mesh containers include the Grafana RPM from RHEL and consume CVE fixes for Grafana from RHEL channels. The servicemesh-grafana RPM shipped in early versions of OpenShift Service Mesh 2.1 is no longer maintained.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-39324" }, { "category": "external", "summary": "RHBZ#2148252", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148252" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-39324", "url": "https://www.cve.org/CVERecord?id=CVE-2022-39324" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-39324", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39324" }, { "category": "external", "summary": "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/", "url": "https://grafana.com/blog/2023/01/25/grafana-security-releases-new-versions-with-fixes-for-cve-2022-23552-cve-2022-41912-and-cve-2022-39324/" } ], "release_date": "2023-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "grafana: Spoofing of the originalUrl parameter of snapshots" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" }, { "cve": "CVE-2022-41912", "cwe": { "id": "CWE-165", "name": "Improper Neutralization of Multiple Internal Special Elements" }, "discovery_date": "2022-11-29T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2149181" } ], "notes": [ { "category": "description", "text": "An authentication bypass flaw was discovered in the crewjam/saml go package. A remote unauthenticated attacker could trigger it by sending a SAML request. This would allow an escalation of privileges and then enable compromising system integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Whilst the Red Hat Advanced Cluster Management for Kubernetes (RHACM) acm-grafana container include the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nThe OCP grafana-container includes the vulnerable underscore library, the access to it is protected by OpenShift OAuth. Therefore the impact by this flaw is reduced from Critical to Important.\n\nWhile Red Hat Ceph Storage 4\u0027s grafana-container includes the affected code, this is used for logging and limits access to the rest of the Ceph cluster. Thus the impact has been reduced from critical to important. Red Hat Ceph Storage 3 and 4 do not use crewjam/saml in their version of grafana.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "known_not_affected": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41912" }, { "category": "external", "summary": "RHBZ#2149181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149181" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41912", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41912" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41912", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41912" }, { "category": "external", "summary": "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g", "url": "https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g" } ], "release_date": "2022-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-15T15:59:41+00:00", "details": "For details on how to apply this update, see Upgrade a Red Hat Ceph Storage\ncluster using cephadm in the Red Hat Storage Ceph Upgrade\nGuide.(https://access.redhat.com/documentation/en-us/red_hat_ceph_storage)", "product_ids": [ "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3642" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:2ae4274163155d880cbd41d1a197d6856f326501a50e028ff3de9ff8a85b3e97_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:36abd2b22ebabea813c5afde35b0b80a200056f811267e89f0270da9155b1a22_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/keepalived-rhel9@sha256:b21d882fd2d08d6f162dbb63e0626d9d6aa892a677c5a28edc97b84feef1655a_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:1d7ca201b778e6a6cb559129e240233b6b6461399c67f979c07d5fe288c400f6_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:3fb7480f9d68333e168eae0c9fbeceb0df7962a40c25ecced81ea4c4959b2c25_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-dashboard-rhel9@sha256:50329da263e8ef00c47632156761621bac30fead5e574ef23cd1d30b7af0019a_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:72bd6eb932a368af10d5c607d8b60e0fe8b87862f4adaa17fd022a3427a46ca8_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:953630d9f9924f17ab7ce168772c3facbaf6866b79a1cf0fb9aee1dcf6eb8c7d_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-6-rhel9@sha256:9b477366f861df49b533d95941b9770b032827bb4a259c5f86abce8705960c05_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:720b3207087d4feb8ab59ffd0b70d6bc22fa21d53b62393779dfaf8972a32e60_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:8cc4a146d7be5046b416fe9c04d77b4f0a25a2ab7180fdbf8c46cff8e2483080_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-haproxy-rhel9@sha256:e4da2c9d53159d43c6795151eb3c9dea373da19b34d76094b60e7a2466415d62_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:44697ad0d15d1f37b98243f5f013cb9271d70e2b10ab52093a1d7e3409a674b2_s390x", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:b46c0196fab3bd3a60b64a1d7ff8af6fbc7c3e526618da1cc78032bffa3be171_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/rhceph-promtail-rhel9@sha256:f52fd8d5fbfdcc202c5e31096119377a8b87f9efd31602398d45cec86ec35940_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:8887234fbbaddf620eaa7b0f4b1ed6ab8aa5bc52e019e67179554ccd03fba676_ppc64le", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:9078b49846d8ec681bec5b96f0d4087b4c66bdc6baf4701cfc9c8e8aeae89661_amd64", "9Base-RHCEPH-6.1-Tools:rhceph/snmp-notifier-rhel9@sha256:df7c89608fe8352d445efcc1017521b35878cfe61a8b9fd91fab24c00786b2bf_s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements" } ] }
rhsa-2022_5068
Vulnerability from csaf_redhat
Published
2022-08-10 10:13
Modified
2024-12-17 21:59
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.11.0 packages and security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.11.0 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.11.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* ignition: configs are accessible from unprivileged containers in VMs running on VMware products (CVE-2022-1706)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.11.0 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.11.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nSecurity Fix(es):\n\n* ignition: configs are accessible from unprivileged containers in VMs running on VMware products (CVE-2022-1706)\n* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n* runc: incorrect handling of inheritable capabilities (CVE-2022-29162)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5068", "url": "https://access.redhat.com/errata/RHSA-2022:5068" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2082274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082274" }, { "category": "external", "summary": "2086398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086398" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5068.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.11.0 packages and security update", "tracking": { "current_release_date": "2024-12-17T21:59:04+00:00", "generator": { "date": "2024-12-17T21:59:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5068", "initial_release_date": "2022-08-10T10:13:03+00:00", "revision_history": [ { "date": "2022-08-10T10:13:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-10T10:13:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:59:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.11", "product": { "name": "Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.11::el8" } } }, { "category": "product_name", "name": "Ironic content for Red Hat OpenShift Container Platform 4.11", "product": { "name": "Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_ironic:4.11::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "product": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "product_id": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-2.el8.src", "product": { "name": "buildah-1:1.23.4-2.el8.src", "product_id": "buildah-1:1.23.4-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-2.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "butane-0:0.15.0-1.rhaos4.11.el8.src", "product": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.src", "product_id": "butane-0:0.15.0-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.15.0-1.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-2.rhaos4.11.el8.src", "product": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.src", "product_id": "conmon-2:2.1.2-2.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-2.rhaos4.11.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "product": { "name": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "product_id": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.3-2.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "product": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "product_id": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-5.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "containers-common-2:1-21.rhaos4.11.el8.src", "product": { "name": "containers-common-2:1-21.rhaos4.11.el8.src", "product_id": "containers-common-2:1-21.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-21.rhaos4.11.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "product": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "product_id": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.15.0-2.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "criu-0:3.15-4.rhaos4.11.el8.src", "product": { "name": "criu-0:3.15-4.rhaos4.11.el8.src", "product_id": "criu-0:3.15-4.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "crun-0:1.4.2-1.rhaos4.11.el8.src", "product": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.src", "product_id": "crun-0:1.4.2-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.4.2-1.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "product": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "product_id": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "haproxy-0:2.2.24-1.el8.src", "product": { "name": "haproxy-0:2.2.24-1.el8.src", "product_id": "haproxy-0:2.2.24-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy@2.2.24-1.el8?arch=src" } } }, { "category": "product_version", "name": "kata-containers-0:2.4.2-1.el8.src", "product": { "name": "kata-containers-0:2.4.2-1.el8.src", "product_id": "kata-containers-0:2.4.2-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.4.2-1.el8?arch=src" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.src", "product": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.src", "product_id": "libslirp-0:4.4.0-2.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-2.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "product": { "name": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "product_id": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.11.0-202206240216.p0.g9de1722.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openvswitch2.17-0:2.17.0-22.el8fdp.src", "product": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.src", "product_id": "openvswitch2.17-0:2.17.0-22.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17@2.17.0-22.el8fdp?arch=src" } } }, { "category": "product_version", "name": "ovn22.03-0:22.03.0-37.el8fdp.src", "product": { "name": "ovn22.03-0:22.03.0-37.el8fdp.src", "product_id": "ovn22.03-0:22.03.0-37.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.0-37.el8fdp?arch=src" } } }, { "category": "product_version", "name": "podman-2:4.0.2-6.rhaos4.11.el8.src", "product": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.src", "product_id": "podman-2:4.0.2-6.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-6.rhaos4.11.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-1.rhaos4.11.el8.src", "product": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.src", "product_id": "runc-3:1.1.2-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-1.rhaos4.11.el8?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "product": { "name": "rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "product_id": "rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn@5.3.0-1.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "product": { "name": "rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "product_id": "rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd@0.2.5-3.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.src", "product": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.src", "product_id": "skopeo-2:1.5.2-3.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-3.rhaos4.11.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "product": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "product_id": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.9-1.rhaos4.11.el8.src", "product": { "name": "toolbox-0:0.0.9-1.rhaos4.11.el8.src", "product_id": "toolbox-0:0.0.9-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.9-1.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "product": { "name": "container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "product_id": "container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.188.0-1.rhaos4.11.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "product": { "name": "openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "product_id": "openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.11.0-202207082037.p0.g9546431.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "ignition-0:2.14.0-3.rhaos4.11.el8.src", "product": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.src", "product_id": "ignition-0:2.14.0-3.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "cri-tools-0:1.24.2-4.1.el8.src", "product": { "name": "cri-tools-0:1.24.2-4.1.el8.src", "product_id": "cri-tools-0:1.24.2-4.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.24.2-4.1.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "product": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "product_id": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202207291716.p0.g7075089.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "ovn22.06-0:22.06.0-27.el8fdp.src", "product": { "name": "ovn22.06-0:22.06.0-27.el8fdp.src", "product_id": "ovn22.06-0:22.06.0-27.el8fdp.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06@22.06.0-27.el8fdp?arch=src" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-5.el8.src", "product": { "name": "libsodium-0:1.0.16-5.el8.src", "product_id": "libsodium-0:1.0.16-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-5.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "product": { "name": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "product_id": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.12.1-0.20220513095437.6dd37e5.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "product": { "name": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "product_id": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@8.6.1-0.20220623075054.1d50c23.el8?arch=src" } } }, { "category": "product_version", "name": "pyparsing-0:2.3.1-2.el8.src", "product": { "name": "pyparsing-0:2.3.1-2.el8.src", "product_id": "pyparsing-0:2.3.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pyparsing@2.3.1-2.el8?arch=src" } } }, { "category": "product_version", "name": "pysnmp-0:4.4.8-3.el8.src", "product": { "name": "pysnmp-0:4.4.8-3.el8.src", "product_id": "pysnmp-0:4.4.8-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/pysnmp@4.4.8-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-SecretStorage-0:2.3.1-9.el8.src", "product": { "name": "python-SecretStorage-0:2.3.1-9.el8.src", "product_id": "python-SecretStorage-0:2.3.1-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-SecretStorage@2.3.1-9.el8?arch=src" } } }, { "category": "product_version", "name": "python-alembic-0:1.4.2-6.el8.src", "product": { "name": "python-alembic-0:1.4.2-6.el8.src", "product_id": "python-alembic-0:1.4.2-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-alembic@1.4.2-6.el8?arch=src" } } }, { "category": "product_version", "name": "python-amqp-0:2.5.2-8.el8.src", "product": { "name": "python-amqp-0:2.5.2-8.el8.src", "product_id": "python-amqp-0:2.5.2-8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-amqp@2.5.2-8.el8?arch=src" } } }, { "category": "product_version", "name": "python-appdirs-0:1.4.0-8.el8.src", "product": { "name": "python-appdirs-0:1.4.0-8.el8.src", "product_id": "python-appdirs-0:1.4.0-8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-appdirs@1.4.0-8.el8?arch=src" } } }, { "category": "product_version", "name": "python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "product": { "name": "python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "product_id": "python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-automaton@2.5.0-0.20220509195848.aaca110.el8?arch=src" } } }, { "category": "product_version", "name": "python-bcrypt-0:3.1.6-3.el8.src", "product": { "name": "python-bcrypt-0:3.1.6-3.el8.src", "product_id": "python-bcrypt-0:3.1.6-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-bcrypt@3.1.6-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-beautifulsoup4-0:4.9.3-2.el8.src", "product": { "name": "python-beautifulsoup4-0:4.9.3-2.el8.src", "product_id": "python-beautifulsoup4-0:4.9.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-beautifulsoup4@4.9.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-cachetools-0:3.1.0-3.el8.src", "product": { "name": "python-cachetools-0:3.1.0-3.el8.src", "product_id": "python-cachetools-0:3.1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cachetools@3.1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "product": { "name": "python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "product_id": "python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cinderclient@8.3.0-0.20220509212734.ee59b68.el8?arch=src" } } }, { "category": "product_version", "name": "python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "product": { "name": "python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "product_id": "python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-cliff@3.10.1-0.20220509200732.a04a48f.el8?arch=src" } } }, { "category": "product_version", "name": "python-colorama-0:0.4.1-2.el8.src", "product": { "name": "python-colorama-0:0.4.1-2.el8.src", "product_id": "python-colorama-0:0.4.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-colorama@0.4.1-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-construct-0:2.10.56-2.el8.src", "product": { "name": "python-construct-0:2.10.56-2.el8.src", "product_id": "python-construct-0:2.10.56-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-construct@2.10.56-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "product": { "name": "python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "product_id": "python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-debtcollector@2.5.0-0.20220509211533.a6b46c5.el8?arch=src" } } }, { "category": "product_version", "name": "python-decorator-0:4.4.0-6.el8.src", "product": { "name": "python-decorator-0:4.4.0-6.el8.src", "product_id": "python-decorator-0:4.4.0-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-decorator@4.4.0-6.el8?arch=src" } } }, { "category": "product_version", "name": "python-dogpile-cache-0:1.1.2-2.el8.src", "product": { "name": "python-dogpile-cache-0:1.1.2-2.el8.src", "product_id": "python-dogpile-cache-0:1.1.2-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-dogpile-cache@1.1.2-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "product": { "name": "python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "product_id": "python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-dracclient@8.0.0-0.20220509201613.9c7499c.el8?arch=src" } } }, { "category": "product_version", "name": "python-editor-0:1.0.4-5.el8.src", "product": { "name": "python-editor-0:1.0.4-5.el8.src", "product_id": "python-editor-0:1.0.4-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-editor@1.0.4-5.el8?arch=src" } } }, { "category": "product_version", "name": "python-fasteners-0:0.14.1-21.el8.src", "product": { "name": "python-fasteners-0:0.14.1-21.el8.src", "product_id": "python-fasteners-0:0.14.1-21.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-fasteners@0.14.1-21.el8?arch=src" } } }, { "category": "product_version", "name": "python-flask-1:1.1.1-2.el8.src", "product": { "name": "python-flask-1:1.1.1-2.el8.src", "product_id": "python-flask-1:1.1.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-flask@1.1.1-2.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-funcsigs-0:1.0.2-17.el8.src", "product": { "name": "python-funcsigs-0:1.0.2-17.el8.src", "product_id": "python-funcsigs-0:1.0.2-17.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-funcsigs@1.0.2-17.el8?arch=src" } } }, { "category": "product_version", "name": "python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "product": { "name": "python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "product_id": "python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-futurist@2.4.1-0.20220509215250.159d752.el8?arch=src" } } }, { "category": "product_version", "name": "python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "product": { "name": "python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "product_id": "python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glanceclient@3.6.0-0.20220509212414.626c500.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-greenlet-0:0.4.14-6.el8.src", "product": { "name": "python-greenlet-0:0.4.14-6.el8.src", "product_id": "python-greenlet-0:0.4.14-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-greenlet@0.4.14-6.el8?arch=src" } } }, { "category": "product_version", "name": "python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "product": { "name": "python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "product_id": "python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-hardware@0.29.0-0.20220216015636.7662a1d.el8?arch=src" } } }, { "category": "product_version", "name": "python-ifaddr-0:0.1.6-6.el8.src", "product": { "name": "python-ifaddr-0:0.1.6-6.el8.src", "product_id": "python-ifaddr-0:0.1.6-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ifaddr@0.1.6-6.el8?arch=src" } } }, { "category": "product_version", "name": "python-importlib-metadata-0:1.7.0-2.el8.src", "product": { "name": "python-importlib-metadata-0:1.7.0-2.el8.src", "product_id": "python-importlib-metadata-0:1.7.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-importlib-metadata@1.7.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "product": { "name": "python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "product_id": "python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ironic-lib@5.1.1-0.20220225151335.e205816.el8?arch=src" } } }, { "category": "product_version", "name": "python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "product": { "name": "python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "product_id": "python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-ironic-prometheus-exporter@3.1.1-0.20220324125409.db1a824.el8?arch=src" } } }, { "category": "product_version", "name": "python-iso8601-0:0.1.12-9.el8.src", "product": { "name": "python-iso8601-0:0.1.12-9.el8.src", "product_id": "python-iso8601-0:0.1.12-9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-iso8601@0.1.12-9.el8?arch=src" } } }, { "category": "product_version", "name": "python-jsonpath-rw-0:1.2.3-23.el8.src", "product": { "name": "python-jsonpath-rw-0:1.2.3-23.el8.src", "product_id": "python-jsonpath-rw-0:1.2.3-23.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-jsonpath-rw@1.2.3-23.el8?arch=src" } } }, { "category": "product_version", "name": "python-jsonschema-0:3.2.0-6.el8.src", "product": { "name": "python-jsonschema-0:3.2.0-6.el8.src", "product_id": "python-jsonschema-0:3.2.0-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-jsonschema@3.2.0-6.el8?arch=src" } } }, { "category": "product_version", "name": "python-kazoo-0:2.7.0-2.el8.src", "product": { "name": "python-kazoo-0:2.7.0-2.el8.src", "product_id": "python-kazoo-0:2.7.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kazoo@2.7.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-keyring-0:21.0.0-2.el8.src", "product": { "name": "python-keyring-0:21.0.0-2.el8.src", "product_id": "python-keyring-0:21.0.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-keyring@21.0.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "product": { "name": "python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "product_id": "python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-keystoneauth1@4.5.0-0.20220509213157.8da0a63.el8?arch=src" } } }, { "category": "product_version", "name": "python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "product": { "name": "python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "product_id": "python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-keystoneclient@4.4.0-0.20220509200759.100253d.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "product": { "name": "python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "product_id": "python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-keystonemiddleware@9.4.0-0.20220509211054.8a05709.el8?arch=src" } } }, { "category": "product_version", "name": "python-kombu-1:4.6.6-8.el8.src", "product": { "name": "python-kombu-1:4.6.6-8.el8.src", "product_id": "python-kombu-1:4.6.6-8.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-kombu@4.6.6-8.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-logutils-0:0.3.5-7.1.el8.src", "product": { "name": "python-logutils-0:0.3.5-7.1.el8.src", "product_id": "python-logutils-0:0.3.5-7.1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-logutils@0.3.5-7.1.el8?arch=src" } } }, { "category": "product_version", "name": "python-memcached-0:1.58-12.el8.src", "product": { "name": "python-memcached-0:1.58-12.el8.src", "product_id": "python-memcached-0:1.58-12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-memcached@1.58-12.el8?arch=src" } } }, { "category": "product_version", "name": "python-migrate-0:0.13.0-2.el8.src", "product": { "name": "python-migrate-0:0.13.0-2.el8.src", "product_id": "python-migrate-0:0.13.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-migrate@0.13.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-msgpack-0:0.6.2-2.el8.src", "product": { "name": "python-msgpack-0:0.6.2-2.el8.src", "product_id": "python-msgpack-0:0.6.2-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-msgpack@0.6.2-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-munch-0:2.3.2-7.el8.src", "product": { "name": "python-munch-0:2.3.2-7.el8.src", "product_id": "python-munch-0:2.3.2-7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-munch@2.3.2-7.el8?arch=src" } } }, { "category": "product_version", "name": "python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "product": { "name": "python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "product_id": "python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-openstacksdk@0.61.0-0.20220509201549.26c9bc2.el8?arch=src" } } }, { "category": "product_version", "name": "python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "product": { "name": "python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "product_id": "python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-os-service-types@1.7.0-0.20220215231659.0b2f473.el8?arch=src" } } }, { "category": "product_version", "name": "python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "product": { "name": "python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "product_id": "python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-os-traits@2.7.0-0.20220509205801.3d1dbf0.el8?arch=src" } } }, { "category": "product_version", "name": "python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "product": { "name": "python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "product_id": "python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-osc-lib@2.5.0-0.20220509211843.78d276e.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "product": { "name": "python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "product_id": "python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-cache@2.8.1-0.20220216000746.40946a9.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "product": { "name": "python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "product_id": "python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-concurrency@4.5.1-0.20220509221157.145f060.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "product": { "name": "python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "product_id": "python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-config@8.8.0-0.20220509202553.64c82a0.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "product": { "name": "python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "product_id": "python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-context@4.1.0-0.20220509205437.3400cc2.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "product": { "name": "python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "product_id": "python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-db@9.1.0-0.20220216003829.be2cc6a.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "product": { "name": "python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "product_id": "python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-i18n@5.1.0-0.20220216011159.b031d17.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "product": { "name": "python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "product_id": "python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-log@4.6.0-0.20220216002407.41c8807.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "product": { "name": "python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "product_id": "python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-messaging@12.13.0-0.20220509210748.2d090b5.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "product": { "name": "python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "product_id": "python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-metrics@0.3.0-0.20220216012738.43eee50.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "product": { "name": "python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "product_id": "python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-middleware@4.5.1-0.20220509203328.2f72b30.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "product": { "name": "python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "product_id": "python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-policy@3.12.1-0.20220509221328.9673a74.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "product": { "name": "python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "product_id": "python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-rootwrap@6.3.1-0.20220509204453.1b1b960.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "product": { "name": "python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "product_id": "python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-serialization@4.3.0-0.20220509195921.6910f75.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "product": { "name": "python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "product_id": "python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-service@2.8.0-0.20220509203713.6552b9a.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "product": { "name": "python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "product_id": "python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-upgradecheck@1.5.0-0.20220509195112.1559e03.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "product": { "name": "python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "product_id": "python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-utils@4.13.0-0.20220509213520.de4429f.el8?arch=src" } } }, { "category": "product_version", "name": "python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "product": { "name": "python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "product_id": "python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-versionedobjects@2.6.0-0.20220509202736.25d34d6.el8?arch=src" } } }, { "category": "product_version", "name": "python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "product": { "name": "python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "product_id": "python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-osprofiler@3.4.3-0.20220509214403.3286301.el8?arch=src" } } }, { "category": "product_version", "name": "python-packaging-0:20.4-2.el8.src", "product": { "name": "python-packaging-0:20.4-2.el8.src", "product_id": "python-packaging-0:20.4-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-packaging@20.4-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-paste-0:3.2.4-2.el8.src", "product": { "name": "python-paste-0:3.2.4-2.el8.src", "product_id": "python-paste-0:3.2.4-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paste@3.2.4-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-paste-deploy-0:2.0.1-5.el8.src", "product": { "name": "python-paste-deploy-0:2.0.1-5.el8.src", "product_id": "python-paste-deploy-0:2.0.1-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-paste-deploy@2.0.1-5.el8?arch=src" } } }, { "category": "product_version", "name": "python-pbr-0:5.5.1-2.el8.src", "product": { "name": "python-pbr-0:5.5.1-2.el8.src", "product_id": "python-pbr-0:5.5.1-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pbr@5.5.1-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-pecan-0:1.3.2-10.el8.src", "product": { "name": "python-pecan-0:1.3.2-10.el8.src", "product_id": "python-pecan-0:1.3.2-10.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pecan@1.3.2-10.el8?arch=src" } } }, { "category": "product_version", "name": "python-pexpect-0:4.6-3.el8.src", "product": { "name": "python-pexpect-0:4.6-3.el8.src", "product_id": "python-pexpect-0:4.6-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pexpect@4.6-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "product": { "name": "python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "product_id": "python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-proliantutils@2.13.2-0.20220509214147.8c7b6b1.el8?arch=src" } } }, { "category": "product_version", "name": "python-prometheus_client-0:0.7.1-3.el8.src", "product": { "name": "python-prometheus_client-0:0.7.1-3.el8.src", "product_id": "python-prometheus_client-0:0.7.1-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-prometheus_client@0.7.1-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "product": { "name": "python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "product_id": "python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pycadf@3.1.1-0.20220215232623.4179996.el8?arch=src" } } }, { "category": "product_version", "name": "python-pycdlib-0:1.11.0-4.el8.src", "product": { "name": "python-pycdlib-0:1.11.0-4.el8.src", "product_id": "python-pycdlib-0:1.11.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pycdlib@1.11.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "python-pynacl-0:1.3.0-6.el8.src", "product": { "name": "python-pynacl-0:1.3.0-6.el8.src", "product_id": "python-pynacl-0:1.3.0-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pynacl@1.3.0-6.el8?arch=src" } } }, { "category": "product_version", "name": "python-pyperclip-0:1.6.4-7.el8.src", "product": { "name": "python-pyperclip-0:1.6.4-7.el8.src", "product_id": "python-pyperclip-0:1.6.4-7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyperclip@1.6.4-7.el8?arch=src" } } }, { "category": "product_version", "name": "python-pyrsistent-0:0.16.0-4.el8.src", "product": { "name": "python-pyrsistent-0:0.16.0-4.el8.src", "product_id": "python-pyrsistent-0:0.16.0-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyrsistent@0.16.0-4.el8?arch=src" } } }, { "category": "product_version", "name": "python-redis-0:3.3.8-2.el8.src", "product": { "name": "python-redis-0:3.3.8-2.el8.src", "product_id": "python-redis-0:3.3.8-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-redis@3.3.8-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-repoze-lru-0:0.7-7.el8.src", "product": { "name": "python-repoze-lru-0:0.7-7.el8.src", "product_id": "python-repoze-lru-0:0.7-7.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-repoze-lru@0.7-7.el8?arch=src" } } }, { "category": "product_version", "name": "python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "product": { "name": "python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "product_id": "python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-requestsexceptions@1.4.0-0.20220215231659.d7ac0ff.el8?arch=src" } } }, { "category": "product_version", "name": "python-retrying-0:1.2.3-22.el8.src", "product": { "name": "python-retrying-0:1.2.3-22.el8.src", "product_id": "python-retrying-0:1.2.3-22.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-retrying@1.2.3-22.el8?arch=src" } } }, { "category": "product_version", "name": "python-rfc3986-0:1.2.0-6.el8.src", "product": { "name": "python-rfc3986-0:1.2.0-6.el8.src", "product_id": "python-rfc3986-0:1.2.0-6.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-rfc3986@1.2.0-6.el8?arch=src" } } }, { "category": "product_version", "name": "python-routes-0:2.4.1-12.el8.src", "product": { "name": "python-routes-0:2.4.1-12.el8.src", "product_id": "python-routes-0:2.4.1-12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-routes@2.4.1-12.el8?arch=src" } } }, { "category": "product_version", "name": "python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "product": { "name": "python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "product_id": "python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-scciclient@0.11.1-0.20220216020832.a84332b.el8?arch=src" } } }, { "category": "product_version", "name": "python-simplegeneric-0:0.8.1-18.el8.src", "product": { "name": "python-simplegeneric-0:0.8.1-18.el8.src", "product_id": "python-simplegeneric-0:0.8.1-18.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-simplegeneric@0.8.1-18.el8?arch=src" } } }, { "category": "product_version", "name": "python-simplejson-0:3.17.0-2.el8.src", "product": { "name": "python-simplejson-0:3.17.0-2.el8.src", "product_id": "python-simplejson-0:3.17.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-simplejson@3.17.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-singledispatch-0:3.4.0.3-19.el8.src", "product": { "name": "python-singledispatch-0:3.4.0.3-19.el8.src", "product_id": "python-singledispatch-0:3.4.0.3-19.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-singledispatch@3.4.0.3-19.el8?arch=src" } } }, { "category": "product_version", "name": "python-six-0:1.15.0-3.el8.src", "product": { "name": "python-six-0:1.15.0-3.el8.src", "product_id": "python-six-0:1.15.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-six@1.15.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-soupsieve-0:2.1.0-2.el8.src", "product": { "name": "python-soupsieve-0:2.1.0-2.el8.src", "product_id": "python-soupsieve-0:2.1.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-soupsieve@2.1.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-sqlparse-0:0.2.4-10.el8.src", "product": { "name": "python-sqlparse-0:0.2.4-10.el8.src", "product_id": "python-sqlparse-0:0.2.4-10.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sqlparse@0.2.4-10.el8?arch=src" } } }, { "category": "product_version", "name": "python-statsd-0:3.2.1-17.el8.src", "product": { "name": "python-statsd-0:3.2.1-17.el8.src", "product_id": "python-statsd-0:3.2.1-17.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-statsd@3.2.1-17.el8?arch=src" } } }, { "category": "product_version", "name": "python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "product": { "name": "python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "product_id": "python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-stevedore@3.5.0-0.20220509195112.442f157.el8?arch=src" } } }, { "category": "product_version", "name": "python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "product": { "name": "python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "product_id": "python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy@4.1.1-0.20220302175405.c769149.el8?arch=src" } } }, { "category": "product_version", "name": "python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "product": { "name": "python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "product_id": "python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-sushy-oem-idrac@4.0.0-0.20220324125409.7b75e6e.el8?arch=src" } } }, { "category": "product_version", "name": "python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "product": { "name": "python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "product_id": "python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-swiftclient@3.13.1-0.20220509204112.4989d94.el8?arch=src" } } }, { "category": "product_version", "name": "python-tempita-0:0.5.1-25.el8.src", "product": { "name": "python-tempita-0:0.5.1-25.el8.src", "product_id": "python-tempita-0:0.5.1-25.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tempita@0.5.1-25.el8?arch=src" } } }, { "category": "product_version", "name": "python-tenacity-0:6.2.0-2.el8.src", "product": { "name": "python-tenacity-0:6.2.0-2.el8.src", "product_id": "python-tenacity-0:6.2.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tenacity@6.2.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "product": { "name": "python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "product_id": "python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-tooz@2.11.1-0.20220509215238.96f91b9.el8?arch=src" } } }, { "category": "product_version", "name": "python-vine-0:1.3.0-5.el8.src", "product": { "name": "python-vine-0:1.3.0-5.el8.src", "product_id": "python-vine-0:1.3.0-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-vine@1.3.0-5.el8?arch=src" } } }, { "category": "product_version", "name": "python-voluptuous-0:0.11.7-3.el8.src", "product": { "name": "python-voluptuous-0:0.11.7-3.el8.src", "product_id": "python-voluptuous-0:0.11.7-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-voluptuous@0.11.7-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-waitress-0:2.0.0-2.el8.src", "product": { "name": "python-waitress-0:2.0.0-2.el8.src", "product_id": "python-waitress-0:2.0.0-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-waitress@2.0.0-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-warlock-0:1.3.3-2.el8.src", "product": { "name": "python-warlock-0:1.3.3-2.el8.src", "product_id": "python-warlock-0:1.3.3-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-warlock@1.3.3-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-wcwidth-0:0.1.7-15.el8.src", "product": { "name": "python-wcwidth-0:0.1.7-15.el8.src", "product_id": "python-wcwidth-0:0.1.7-15.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wcwidth@0.1.7-15.el8?arch=src" } } }, { "category": "product_version", "name": "python-webob-0:1.8.5-5.el8.src", "product": { "name": "python-webob-0:1.8.5-5.el8.src", "product_id": "python-webob-0:1.8.5-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-webob@1.8.5-5.el8?arch=src" } } }, { "category": "product_version", "name": "python-webtest-0:2.0.33-5.el8.src", "product": { "name": "python-webtest-0:2.0.33-5.el8.src", "product_id": "python-webtest-0:2.0.33-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-webtest@2.0.33-5.el8?arch=src" } } }, { "category": "product_version", "name": "python-werkzeug-0:2.0.3-1.el8.src", "product": { "name": "python-werkzeug-0:2.0.3-1.el8.src", "product_id": "python-werkzeug-0:2.0.3-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-werkzeug@2.0.3-1.el8?arch=src" } } }, { "category": "product_version", "name": "python-wrapt-0:1.11.2-4.el8.src", "product": { "name": "python-wrapt-0:1.11.2-4.el8.src", "product_id": "python-wrapt-0:1.11.2-4.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wrapt@1.11.2-4.el8?arch=src" } } }, { "category": "product_version", "name": "python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "product": { "name": "python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "product_id": "python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wsme@0.11.0-0.20220216004816.80bda90.el8?arch=src" } } }, { "category": "product_version", "name": "python-yappi-0:1.0-3.el8.src", "product": { "name": "python-yappi-0:1.0-3.el8.src", "product_id": "python-yappi-0:1.0-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-yappi@1.0-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-zake-0:0.2.2-19.el8.src", "product": { "name": "python-zake-0:0.2.2-19.el8.src", "product_id": "python-zake-0:0.2.2-19.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-zake@0.2.2-19.el8?arch=src" } } }, { "category": "product_version", "name": "python-zeroconf-0:0.24.4-2.el8.src", "product": { "name": "python-zeroconf-0:0.24.4-2.el8.src", "product_id": "python-zeroconf-0:0.24.4-2.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-zeroconf@0.24.4-2.el8?arch=src" } } }, { "category": "product_version", "name": "python-zipp-0:0.5.1-3.el8.src", "product": { "name": "python-zipp-0:0.5.1-3.el8.src", "product_id": "python-zipp-0:0.5.1-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-zipp@0.5.1-3.el8?arch=src" } } }, { "category": "product_version", "name": "openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "product": { "name": "openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "product_id": "openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic@20.2.1-0.20220628175043.b5ed57a.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "python-dataclasses-0:0.8-3.el8.src", "product": { "name": "python-dataclasses-0:0.8-3.el8.src", "product_id": "python-dataclasses-0:0.8-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-dataclasses@0.8-3.el8?arch=src" } } }, { "category": "product_version", "name": "python-pint-0:0.10.1-3.el8.src", "product": { "name": "python-pint-0:0.10.1-3.el8.src", "product_id": "python-pint-0:0.10.1-3.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pint@0.10.1-3.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "product": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "product_id": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-2.el8.x86_64", "product": { "name": "buildah-1:1.23.4-2.el8.x86_64", "product_id": "buildah-1:1.23.4-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-2.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-2.el8.x86_64", "product": { "name": "buildah-tests-1:1.23.4-2.el8.x86_64", "product_id": "buildah-tests-1:1.23.4-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-2.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-2.el8.x86_64", "product": { "name": "buildah-debugsource-1:1.23.4-2.el8.x86_64", "product_id": "buildah-debugsource-1:1.23.4-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-2.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-2.el8.x86_64", "product": { "name": "buildah-debuginfo-1:1.23.4-2.el8.x86_64", "product_id": "buildah-debuginfo-1:1.23.4-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-2.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "product_id": "buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-2.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "product": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "product_id": "butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.15.0-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "product": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "product_id": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.15.0-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "product": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "product_id": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.15.0-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "product": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "product_id": "conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-2.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "product": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "product_id": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-2.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "product": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "product_id": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-2.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "product": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "product_id": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-5.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-5.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-5.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "product": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_id": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.15.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "product": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_id": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.15.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.15.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "product": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_id": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.15.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "crit-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "crit-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "crit-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "criu-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "criu-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "criu-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "product": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "product_id": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "product": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "product_id": "crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.4.2-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "product": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "product_id": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.4.2-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "product": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "product_id": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.4.2-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "product": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "product_id": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy22-0:2.2.24-1.el8.x86_64", "product": { "name": "haproxy22-0:2.2.24-1.el8.x86_64", "product_id": "haproxy22-0:2.2.24-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22@2.2.24-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.24-1.el8.x86_64", "product": { "name": "haproxy-debugsource-0:2.2.24-1.el8.x86_64", "product_id": "haproxy-debugsource-0:2.2.24-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.24-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "product": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "product_id": "haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22-debuginfo@2.2.24-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kata-containers-0:2.4.2-1.el8.x86_64", "product": { "name": "kata-containers-0:2.4.2-1.el8.x86_64", "product_id": "kata-containers-0:2.4.2-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.4.2-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "product": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_id": "libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "product": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_id": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "product": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_id": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "product": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_id": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-2.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product_id": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.17@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product_id": "openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "product_id": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-devel@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "product_id": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-ipsec@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product_id": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "product_id": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debugsource@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "product_id": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "product": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "product_id": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.0-37.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_id": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-6.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "product": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "product_id": "runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-1.rhaos4.11.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "product": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "product_id": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-1.rhaos4.11.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "product": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "product_id": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-1.rhaos4.11.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "product": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "product_id": "afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.3.0-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "product": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "product_id": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.3.0-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "product": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "product_id": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.3.0-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "product": { "name": "bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "product_id": "bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd@0.2.5-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "product": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "product_id": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd-debugsource@0.2.5-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "product": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "product_id": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd-debuginfo@0.2.5-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_id": "skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-3.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_id": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-3.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_id": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-3.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_id": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-3.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "product": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "product_id": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "product_id": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202207082037.p0.g9546431.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "product": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_id": "ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "product": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_id": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.14.0-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "product": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_id": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.14.0-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "product": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_id": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.14.0-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "product": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_id": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.14.0-3.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-0:1.24.2-4.1.el8.x86_64", "product": { "name": "cri-tools-0:1.24.2-4.1.el8.x86_64", "product_id": "cri-tools-0:1.24.2-4.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.24.2-4.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "product": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "product_id": "cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.24.2-4.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "product": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "product_id": "cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.24.2-4.1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product_id": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product_id": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202207291716.p0.g7075089.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.11.0-202207291716.p0.g7075089.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debugsource@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central-debuginfo@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debuginfo@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host-debuginfo@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_id": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep-debuginfo@22.06.0-27.el8fdp?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-5.el8.x86_64", "product": { "name": "libsodium-0:1.0.16-5.el8.x86_64", "product_id": "libsodium-0:1.0.16-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-5.el8.x86_64", "product": { "name": "libsodium-devel-0:1.0.16-5.el8.x86_64", "product_id": "libsodium-devel-0:1.0.16-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-5.el8.x86_64", "product": { "name": "libsodium-static-0:1.0.16-5.el8.x86_64", "product_id": "libsodium-static-0:1.0.16-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-5.el8.x86_64", "product": { "name": "libsodium-debugsource-0:1.0.16-5.el8.x86_64", "product_id": "libsodium-debugsource-0:1.0.16-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "product": { "name": "libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "product_id": "libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-bcrypt-0:3.1.6-3.el8.x86_64", "product": { "name": "python3-bcrypt-0:3.1.6-3.el8.x86_64", "product_id": "python3-bcrypt-0:3.1.6-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bcrypt@3.1.6-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "product": { "name": "python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "product_id": "python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-bcrypt-debugsource@3.1.6-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "product": { "name": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "product_id": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bcrypt-debuginfo@3.1.6-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-greenlet-0:0.4.14-6.el8.x86_64", "product": { "name": "python3-greenlet-0:0.4.14-6.el8.x86_64", "product_id": "python3-greenlet-0:0.4.14-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-greenlet@0.4.14-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "product": { "name": "python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "product_id": "python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-greenlet-devel@0.4.14-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "product": { "name": "python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "product_id": "python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-greenlet-debugsource@0.4.14-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "product": { "name": "python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "product_id": "python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-greenlet-debuginfo@0.4.14-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-msgpack-0:0.6.2-2.el8.x86_64", "product": { "name": "python3-msgpack-0:0.6.2-2.el8.x86_64", "product_id": "python3-msgpack-0:0.6.2-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-msgpack@0.6.2-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "product": { "name": "python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "product_id": "python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-msgpack-debugsource@0.6.2-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "product": { "name": "python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "product_id": "python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-msgpack-debuginfo@0.6.2-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-pynacl-0:1.3.0-6.el8.x86_64", "product": { "name": "python3-pynacl-0:1.3.0-6.el8.x86_64", "product_id": "python3-pynacl-0:1.3.0-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pynacl@1.3.0-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "product": { "name": "python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "product_id": "python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pynacl-debugsource@1.3.0-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "product": { "name": "python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "product_id": "python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pynacl-debuginfo@1.3.0-6.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-pyrsistent-0:0.16.0-4.el8.x86_64", "product": { "name": "python3-pyrsistent-0:0.16.0-4.el8.x86_64", "product_id": "python3-pyrsistent-0:0.16.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyrsistent@0.16.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "product": { "name": "python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "product_id": "python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyrsistent-debugsource@0.16.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "product": { "name": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "product_id": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyrsistent-debuginfo@0.16.0-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-simplejson-0:3.17.0-2.el8.x86_64", "product": { "name": "python3-simplejson-0:3.17.0-2.el8.x86_64", "product_id": "python3-simplejson-0:3.17.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-simplejson@3.17.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "product": { "name": "python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "product_id": "python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-simplejson-debugsource@3.17.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "product": { "name": "python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "product_id": "python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-simplejson-debuginfo@3.17.0-2.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-wrapt-doc-0:1.11.2-4.el8.x86_64", "product": { "name": "python-wrapt-doc-0:1.11.2-4.el8.x86_64", "product_id": "python-wrapt-doc-0:1.11.2-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wrapt-doc@1.11.2-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-wrapt-0:1.11.2-4.el8.x86_64", "product": { "name": "python3-wrapt-0:1.11.2-4.el8.x86_64", "product_id": "python3-wrapt-0:1.11.2-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-wrapt@1.11.2-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "product": { "name": "python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "product_id": "python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wrapt-debugsource@1.11.2-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "product": { "name": "python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "product_id": "python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-wrapt-debuginfo@1.11.2-4.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-yappi-0:1.0-3.el8.x86_64", "product": { "name": "python3-yappi-0:1.0-3.el8.x86_64", "product_id": "python3-yappi-0:1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-yappi@1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python-yappi-debugsource-0:1.0-3.el8.x86_64", "product": { "name": "python-yappi-debugsource-0:1.0-3.el8.x86_64", "product_id": "python-yappi-debugsource-0:1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-yappi-debugsource@1.0-3.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "product": { "name": "python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "product_id": "python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-yappi-debuginfo@1.0-3.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "product": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "product_id": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-2.el8.aarch64", "product": { "name": "buildah-1:1.23.4-2.el8.aarch64", "product_id": "buildah-1:1.23.4-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-2.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-2.el8.aarch64", "product": { "name": "buildah-tests-1:1.23.4-2.el8.aarch64", "product_id": "buildah-tests-1:1.23.4-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-2.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-2.el8.aarch64", "product": { "name": "buildah-debugsource-1:1.23.4-2.el8.aarch64", "product_id": "buildah-debugsource-1:1.23.4-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-2.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-2.el8.aarch64", "product": { "name": "buildah-debuginfo-1:1.23.4-2.el8.aarch64", "product_id": "buildah-debuginfo-1:1.23.4-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-2.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "product_id": "buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-2.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "product": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "product_id": "butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.15.0-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "product": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "product_id": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.15.0-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "product": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "product_id": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.15.0-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "product": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "product_id": "conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-2.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "product": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "product_id": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-2.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "product": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "product_id": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-2.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "product": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "product_id": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-5.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-5.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-5.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "product": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_id": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.15.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "product": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_id": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.15.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.15.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "product": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_id": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.15.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "crit-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "crit-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "crit-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "criu-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "criu-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "criu-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "product": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "product_id": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "product": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "product_id": "crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.4.2-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "product": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "product_id": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.4.2-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "product": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "product_id": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.4.2-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "product": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "product_id": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "haproxy22-0:2.2.24-1.el8.aarch64", "product": { "name": "haproxy22-0:2.2.24-1.el8.aarch64", "product_id": "haproxy22-0:2.2.24-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22@2.2.24-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.24-1.el8.aarch64", "product": { "name": "haproxy-debugsource-0:2.2.24-1.el8.aarch64", "product_id": "haproxy-debugsource-0:2.2.24-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.24-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "product": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "product_id": "haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22-debuginfo@2.2.24-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kata-containers-0:2.4.2-1.el8.aarch64", "product": { "name": "kata-containers-0:2.4.2-1.el8.aarch64", "product_id": "kata-containers-0:2.4.2-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.4.2-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "product": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_id": "libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "product": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_id": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "product": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_id": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "product": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_id": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-2.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product_id": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.17@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product_id": "openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "product_id": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-devel@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "product_id": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-ipsec@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product_id": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "product_id": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debugsource@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "product_id": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "product": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "product_id": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.0-37.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_id": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-6.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "product": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "product_id": "runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-1.rhaos4.11.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "product": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "product_id": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-1.rhaos4.11.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "product": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "product_id": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-1.rhaos4.11.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "product": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "product_id": "afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.3.0-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "product": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "product_id": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.3.0-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "product": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "product_id": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.3.0-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "product": { "name": "bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "product_id": "bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd@0.2.5-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "product": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "product_id": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-bootupd-debugsource@0.2.5-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "product": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "product_id": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bootupd-debuginfo@0.2.5-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_id": "skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-3.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_id": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-3.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_id": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-3.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_id": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-3.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "product": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "product_id": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "product_id": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "product": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "product_id": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202207082037.p0.g9546431.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "product": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_id": "ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "product": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_id": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.14.0-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "product": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_id": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.14.0-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "product": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_id": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.14.0-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "product": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_id": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.14.0-3.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-0:1.24.2-4.1.el8.aarch64", "product": { "name": "cri-tools-0:1.24.2-4.1.el8.aarch64", "product_id": "cri-tools-0:1.24.2-4.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.24.2-4.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "product": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "product_id": "cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.24.2-4.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "product": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "product_id": "cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.24.2-4.1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product_id": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product_id": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product_id": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "product": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "product_id": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202207291716.p0.g7075089.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debugsource@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central-debuginfo@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debuginfo@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host-debuginfo@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_id": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep-debuginfo@22.06.0-27.el8fdp?arch=aarch64" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-5.el8.aarch64", "product": { "name": "libsodium-0:1.0.16-5.el8.aarch64", "product_id": "libsodium-0:1.0.16-5.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-5.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-5.el8.aarch64", "product": { "name": "libsodium-devel-0:1.0.16-5.el8.aarch64", "product_id": "libsodium-devel-0:1.0.16-5.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-5.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-5.el8.aarch64", "product": { "name": "libsodium-static-0:1.0.16-5.el8.aarch64", "product_id": "libsodium-static-0:1.0.16-5.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-5.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libsodium-debugsource-0:1.0.16-5.el8.aarch64", "product": { "name": "libsodium-debugsource-0:1.0.16-5.el8.aarch64", "product_id": "libsodium-debugsource-0:1.0.16-5.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debugsource@1.0.16-5.el8?arch=aarch64" } } }, { "category": "product_version", "name": "libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "product": { "name": "libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "product_id": "libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-debuginfo@1.0.16-5.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-bcrypt-0:3.1.6-3.el8.aarch64", "product": { "name": "python3-bcrypt-0:3.1.6-3.el8.aarch64", "product_id": "python3-bcrypt-0:3.1.6-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bcrypt@3.1.6-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "product": { "name": "python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "product_id": "python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-bcrypt-debugsource@3.1.6-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "product": { "name": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "product_id": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-bcrypt-debuginfo@3.1.6-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-greenlet-0:0.4.14-6.el8.aarch64", "product": { "name": "python3-greenlet-0:0.4.14-6.el8.aarch64", "product_id": "python3-greenlet-0:0.4.14-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-greenlet@0.4.14-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "product": { "name": "python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "product_id": "python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-greenlet-devel@0.4.14-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "product": { "name": "python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "product_id": "python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-greenlet-debugsource@0.4.14-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "product": { "name": "python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "product_id": "python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-greenlet-debuginfo@0.4.14-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-msgpack-0:0.6.2-2.el8.aarch64", "product": { "name": "python3-msgpack-0:0.6.2-2.el8.aarch64", "product_id": "python3-msgpack-0:0.6.2-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-msgpack@0.6.2-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "product": { "name": "python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "product_id": "python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-msgpack-debugsource@0.6.2-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "product": { "name": "python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "product_id": "python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-msgpack-debuginfo@0.6.2-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-pynacl-0:1.3.0-6.el8.aarch64", "product": { "name": "python3-pynacl-0:1.3.0-6.el8.aarch64", "product_id": "python3-pynacl-0:1.3.0-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pynacl@1.3.0-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "product": { "name": "python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "product_id": "python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pynacl-debugsource@1.3.0-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "product": { "name": "python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "product_id": "python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pynacl-debuginfo@1.3.0-6.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-pyrsistent-0:0.16.0-4.el8.aarch64", "product": { "name": "python3-pyrsistent-0:0.16.0-4.el8.aarch64", "product_id": "python3-pyrsistent-0:0.16.0-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyrsistent@0.16.0-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "product": { "name": "python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "product_id": "python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyrsistent-debugsource@0.16.0-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "product": { "name": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "product_id": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyrsistent-debuginfo@0.16.0-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-simplejson-0:3.17.0-2.el8.aarch64", "product": { "name": "python3-simplejson-0:3.17.0-2.el8.aarch64", "product_id": "python3-simplejson-0:3.17.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-simplejson@3.17.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "product": { "name": "python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "product_id": "python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-simplejson-debugsource@3.17.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "product": { "name": "python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "product_id": "python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-simplejson-debuginfo@3.17.0-2.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-wrapt-doc-0:1.11.2-4.el8.aarch64", "product": { "name": "python-wrapt-doc-0:1.11.2-4.el8.aarch64", "product_id": "python-wrapt-doc-0:1.11.2-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wrapt-doc@1.11.2-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-wrapt-0:1.11.2-4.el8.aarch64", "product": { "name": "python3-wrapt-0:1.11.2-4.el8.aarch64", "product_id": "python3-wrapt-0:1.11.2-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-wrapt@1.11.2-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "product": { "name": "python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "product_id": "python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-wrapt-debugsource@1.11.2-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "product": { "name": "python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "product_id": "python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-wrapt-debuginfo@1.11.2-4.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-yappi-0:1.0-3.el8.aarch64", "product": { "name": "python3-yappi-0:1.0-3.el8.aarch64", "product_id": "python3-yappi-0:1.0-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-yappi@1.0-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python-yappi-debugsource-0:1.0-3.el8.aarch64", "product": { "name": "python-yappi-debugsource-0:1.0-3.el8.aarch64", "product_id": "python-yappi-debugsource-0:1.0-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-yappi-debugsource@1.0-3.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "product": { "name": "python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "product_id": "python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-yappi-debuginfo@1.0-3.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "product": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "product_id": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-2.el8.ppc64le", "product": { "name": "buildah-1:1.23.4-2.el8.ppc64le", "product_id": "buildah-1:1.23.4-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-2.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-2.el8.ppc64le", "product": { "name": "buildah-tests-1:1.23.4-2.el8.ppc64le", "product_id": "buildah-tests-1:1.23.4-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-2.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-2.el8.ppc64le", "product": { "name": "buildah-debugsource-1:1.23.4-2.el8.ppc64le", "product_id": "buildah-debugsource-1:1.23.4-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-2.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "product": { "name": "buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "product_id": "buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-2.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-2.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product_id": "butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.15.0-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product_id": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.15.0-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product_id": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.15.0-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product_id": "conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-2.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product_id": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-2.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product_id": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-2.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product_id": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-5.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-5.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-5.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_id": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.15.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_id": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.15.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_id": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.15.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.15.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_id": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.15.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "crit-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "crit-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "crit-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "criu-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "criu-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "product": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "product_id": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product_id": "crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.4.2-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product_id": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.4.2-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product_id": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.4.2-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "product": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "product_id": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy22-0:2.2.24-1.el8.ppc64le", "product": { "name": "haproxy22-0:2.2.24-1.el8.ppc64le", "product_id": "haproxy22-0:2.2.24-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22@2.2.24-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "product": { "name": "haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "product_id": "haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.24-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "product": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "product_id": "haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22-debuginfo@2.2.24-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kata-containers-0:2.4.2-1.el8.ppc64le", "product": { "name": "kata-containers-0:2.4.2-1.el8.ppc64le", "product_id": "kata-containers-0:2.4.2-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kata-containers@2.4.2-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_id": "libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_id": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_id": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_id": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-2.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product_id": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.17@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product_id": "openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "product_id": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-devel@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "product_id": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-ipsec@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product_id": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "product_id": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debugsource@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "product_id": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "product": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "product_id": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.0-37.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_id": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-6.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product_id": "runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-1.rhaos4.11.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product_id": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-1.rhaos4.11.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product_id": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-1.rhaos4.11.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product_id": "afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.3.0-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product_id": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.3.0-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product_id": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.3.0-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_id": "skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_id": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_id": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_id": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product_id": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product_id": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202207082037.p0.g9546431.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_id": "ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_id": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.14.0-3.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_id": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.14.0-3.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_id": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.14.0-3.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_id": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.14.0-3.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-0:1.24.2-4.1.el8.ppc64le", "product": { "name": "cri-tools-0:1.24.2-4.1.el8.ppc64le", "product_id": "cri-tools-0:1.24.2-4.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.24.2-4.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "product": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "product_id": "cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.24.2-4.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "product": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "product_id": "cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.24.2-4.1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product_id": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202207291716.p0.g7075089.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debugsource@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central-debuginfo@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debuginfo@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host-debuginfo@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_id": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep-debuginfo@22.06.0-27.el8fdp?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-5.el8.ppc64le", "product": { "name": "libsodium-0:1.0.16-5.el8.ppc64le", "product_id": "libsodium-0:1.0.16-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-5.el8.ppc64le", "product": { "name": "libsodium-devel-0:1.0.16-5.el8.ppc64le", "product_id": "libsodium-devel-0:1.0.16-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-5.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-5.el8.ppc64le", "product": { "name": "libsodium-static-0:1.0.16-5.el8.ppc64le", "product_id": "libsodium-static-0:1.0.16-5.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-5.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "product": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "product_id": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/atomic-openshift-service-idler@4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-2.el8.s390x", "product": { "name": "buildah-1:1.23.4-2.el8.s390x", "product_id": "buildah-1:1.23.4-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-2.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-2.el8.s390x", "product": { "name": "buildah-tests-1:1.23.4-2.el8.s390x", "product_id": "buildah-tests-1:1.23.4-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-2.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-2.el8.s390x", "product": { "name": "buildah-debugsource-1:1.23.4-2.el8.s390x", "product_id": "buildah-debugsource-1:1.23.4-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-2.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-2.el8.s390x", "product": { "name": "buildah-debuginfo-1:1.23.4-2.el8.s390x", "product_id": "buildah-debuginfo-1:1.23.4-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-2.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "product_id": "buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-2.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "butane-0:0.15.0-1.rhaos4.11.el8.s390x", "product": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.s390x", "product_id": "butane-0:0.15.0-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane@0.15.0-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "product": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "product_id": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debugsource@0.15.0-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "product": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "product_id": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-debuginfo@0.15.0-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "product": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "product_id": "conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-2.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "product": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "product_id": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-2.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "product": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "product_id": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-2.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "product": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "product_id": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-5.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-5.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-5.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "product": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "product_id": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer@0.15.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "product": { "name": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "product_id": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra@0.15.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "product": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "product_id": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debugsource@0.15.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "product": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "product_id": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-bootinfra-debuginfo@0.15.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "product": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "product_id": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/coreos-installer-debuginfo@0.15.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "crit-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "crit-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "crit-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "criu-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "criu-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "criu-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "product": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "product_id": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "crun-0:1.4.2-1.rhaos4.11.el8.s390x", "product": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.s390x", "product_id": "crun-0:1.4.2-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.4.2-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "product": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "product_id": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.4.2-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "product": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "product_id": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.4.2-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "product": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "product_id": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy22-0:2.2.24-1.el8.s390x", "product": { "name": "haproxy22-0:2.2.24-1.el8.s390x", "product_id": "haproxy22-0:2.2.24-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22@2.2.24-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy-debugsource-0:2.2.24-1.el8.s390x", "product": { "name": "haproxy-debugsource-0:2.2.24-1.el8.s390x", "product_id": "haproxy-debugsource-0:2.2.24-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy-debugsource@2.2.24-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "product": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "product_id": "haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/haproxy22-debuginfo@2.2.24-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "product": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "product_id": "libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "product": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "product_id": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "product": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "product_id": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "product": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "product_id": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-2.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product_id": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/network-scripts-openvswitch2.17@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product_id": "openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "product": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "product_id": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-devel@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "product": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "product_id": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-ipsec@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product_id": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "product": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "product_id": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debugsource@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "product": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "product_id": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "product": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "product_id": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openvswitch2.17-debuginfo@2.17.0-22.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debugsource@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-central-debuginfo@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-debuginfo@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-host-debuginfo@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "product": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_id": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.03-vtep-debuginfo@22.03.0-37.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "podman-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_id": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-6.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-1.rhaos4.11.el8.s390x", "product": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.s390x", "product_id": "runc-3:1.1.2-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-1.rhaos4.11.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "product": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "product_id": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-1.rhaos4.11.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "product": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "product_id": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-1.rhaos4.11.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "product": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "product_id": "afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn@5.3.0-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "product": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "product_id": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/rust-afterburn-debugsource@5.3.0-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "product": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "product_id": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/afterburn-debuginfo@5.3.0-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "product": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "product_id": "skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-3.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "product": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "product_id": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-3.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "product": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "product_id": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-3.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "product": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "product_id": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-3.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "product": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "product_id": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.1.8-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "product": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "product_id": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.1.8-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "product": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "product_id": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.1.8-1.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202207082037.p0.g9546431.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "product": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "product_id": "ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition@2.14.0-3.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "product": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "product_id": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate@2.14.0-3.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "product": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "product_id": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debugsource@2.14.0-3.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "product": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "product_id": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-debuginfo@2.14.0-3.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "product": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "product_id": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ignition-validate-debuginfo@2.14.0-3.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-0:1.24.2-4.1.el8.s390x", "product": { "name": "cri-tools-0:1.24.2-4.1.el8.s390x", "product_id": "cri-tools-0:1.24.2-4.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools@1.24.2-4.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "product": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "product_id": "cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debugsource@1.24.2-4.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "product": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "product_id": "cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-tools-debuginfo@1.24.2-4.1.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product_id": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product_id": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product_id": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.1-11.rhaos4.11.gitb0d2ef3.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202207291716.p0.g7075089.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debugsource@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-central-debuginfo@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-debuginfo@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-host-debuginfo@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "product": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_id": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ovn22.06-vtep-debuginfo@22.06.0-27.el8fdp?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-0:1.0.16-5.el8.s390x", "product": { "name": "libsodium-0:1.0.16-5.el8.s390x", "product_id": "libsodium-0:1.0.16-5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium@1.0.16-5.el8?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-devel-0:1.0.16-5.el8.s390x", "product": { "name": "libsodium-devel-0:1.0.16-5.el8.s390x", "product_id": "libsodium-devel-0:1.0.16-5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-devel@1.0.16-5.el8?arch=s390x" } } }, { "category": "product_version", "name": "libsodium-static-0:1.0.16-5.el8.s390x", "product": { "name": "libsodium-static-0:1.0.16-5.el8.s390x", "product_id": "libsodium-static-0:1.0.16-5.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsodium-static@1.0.16-5.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "product": { "name": "butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "product_id": "butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/butane-redistributable@0.15.0-1.rhaos4.11.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "product": { "name": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "product_id": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages@0.20.3-2.rhaos4.11.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "product": { "name": "console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "product_id": "console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-issuegen@0.20.3-2.rhaos4.11.el8?arch=noarch" } } }, { "category": "product_version", "name": "console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "product": { "name": "console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "product_id": "console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/console-login-helper-messages-profile@0.20.3-2.rhaos4.11.el8?arch=noarch" } } }, { "category": "product_version", "name": "containers-common-2:1-21.rhaos4.11.el8.noarch", "product": { "name": "containers-common-2:1-21.rhaos4.11.el8.noarch", "product_id": "containers-common-2:1-21.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-21.rhaos4.11.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "product_id": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.11.0-202206240216.p0.g9de1722.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "product_id": "openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.11.0-202206240216.p0.g9de1722.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "product": { "name": "openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "product_id": "openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openvswitch2.17-test@2.17.0-22.el8fdp?arch=noarch" } } }, { "category": "product_version", "name": "podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "product": { "name": "podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "product_id": "podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.0.2-6.rhaos4.11.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "product": { "name": "toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "product_id": "toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.9-1.rhaos4.11.el8?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "product": { "name": "container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "product_id": "container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.188.0-1.rhaos4.11.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product": { "name": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_id": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector@10.12.1-0.20220513095437.6dd37e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product": { "name": "openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_id": "openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-api@10.12.1-0.20220513095437.6dd37e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product": { "name": "openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_id": "openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-conductor@10.12.1-0.20220513095437.6dd37e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product": { "name": "openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_id": "openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-inspector-dnsmasq@10.12.1-0.20220513095437.6dd37e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product": { "name": "python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_id": "python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-inspector-tests@10.12.1-0.20220513095437.6dd37e5.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "product": { "name": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "product_id": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-python-agent@8.6.1-0.20220623075054.1d50c23.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "product": { "name": "python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "product_id": "python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-python-agent@8.6.1-0.20220623075054.1d50c23.el8?arch=noarch" } } }, { "category": "product_version", "name": "python2-pyparsing-0:2.3.1-2.el8.noarch", "product": { "name": "python2-pyparsing-0:2.3.1-2.el8.noarch", "product_id": "python2-pyparsing-0:2.3.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python2-pyparsing@2.3.1-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pyparsing-0:2.3.1-2.el8.noarch", "product": { "name": "python3-pyparsing-0:2.3.1-2.el8.noarch", "product_id": "python3-pyparsing-0:2.3.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyparsing@2.3.1-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pysnmp-0:4.4.8-3.el8.noarch", "product": { "name": "python3-pysnmp-0:4.4.8-3.el8.noarch", "product_id": "python3-pysnmp-0:4.4.8-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pysnmp@4.4.8-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-SecretStorage-0:2.3.1-9.el8.noarch", "product": { "name": "python3-SecretStorage-0:2.3.1-9.el8.noarch", "product_id": "python3-SecretStorage-0:2.3.1-9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-SecretStorage@2.3.1-9.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-alembic-0:1.4.2-6.el8.noarch", "product": { "name": "python3-alembic-0:1.4.2-6.el8.noarch", "product_id": "python3-alembic-0:1.4.2-6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-alembic@1.4.2-6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-amqp-doc-0:2.5.2-8.el8.noarch", "product": { "name": "python-amqp-doc-0:2.5.2-8.el8.noarch", "product_id": "python-amqp-doc-0:2.5.2-8.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-amqp-doc@2.5.2-8.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-amqp-0:2.5.2-8.el8.noarch", "product": { "name": "python3-amqp-0:2.5.2-8.el8.noarch", "product_id": "python3-amqp-0:2.5.2-8.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-amqp@2.5.2-8.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-appdirs-0:1.4.0-8.el8.noarch", "product": { "name": "python3-appdirs-0:1.4.0-8.el8.noarch", "product_id": "python3-appdirs-0:1.4.0-8.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-appdirs@1.4.0-8.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "product": { "name": "python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "product_id": "python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-automaton@2.5.0-0.20220509195848.aaca110.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "product": { "name": "python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "product_id": "python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-beautifulsoup4@4.9.3-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-cachetools-0:3.1.0-3.el8.noarch", "product": { "name": "python3-cachetools-0:3.1.0-3.el8.noarch", "product_id": "python3-cachetools-0:3.1.0-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cachetools@3.1.0-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "product": { "name": "python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "product_id": "python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cinderclient@8.3.0-0.20220509212734.ee59b68.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "product": { "name": "python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "product_id": "python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cliff@3.10.1-0.20220509200732.a04a48f.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "product": { "name": "python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "product_id": "python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-cliff-tests@3.10.1-0.20220509200732.a04a48f.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-colorama-0:0.4.1-2.el8.noarch", "product": { "name": "python3-colorama-0:0.4.1-2.el8.noarch", "product_id": "python3-colorama-0:0.4.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-colorama@0.4.1-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-construct-0:2.10.56-2.el8.noarch", "product": { "name": "python3-construct-0:2.10.56-2.el8.noarch", "product_id": "python3-construct-0:2.10.56-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-construct@2.10.56-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "product": { "name": "python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "product_id": "python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-debtcollector@2.5.0-0.20220509211533.a6b46c5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-decorator-0:4.4.0-6.el8.noarch", "product": { "name": "python3-decorator-0:4.4.0-6.el8.noarch", "product_id": "python3-decorator-0:4.4.0-6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-decorator@4.4.0-6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-dogpile-cache-0:1.1.2-2.el8.noarch", "product": { "name": "python3-dogpile-cache-0:1.1.2-2.el8.noarch", "product_id": "python3-dogpile-cache-0:1.1.2-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-dogpile-cache@1.1.2-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "product": { "name": "python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "product_id": "python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-dracclient@8.0.0-0.20220509201613.9c7499c.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-editor-0:1.0.4-5.el8.noarch", "product": { "name": "python3-editor-0:1.0.4-5.el8.noarch", "product_id": "python3-editor-0:1.0.4-5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-editor@1.0.4-5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-fasteners-0:0.14.1-21.el8.noarch", "product": { "name": "python3-fasteners-0:0.14.1-21.el8.noarch", "product_id": "python3-fasteners-0:0.14.1-21.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-fasteners@0.14.1-21.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-flask-doc-1:1.1.1-2.el8.noarch", "product": { "name": "python-flask-doc-1:1.1.1-2.el8.noarch", "product_id": "python-flask-doc-1:1.1.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-flask-doc@1.1.1-2.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-flask-1:1.1.1-2.el8.noarch", "product": { "name": "python3-flask-1:1.1.1-2.el8.noarch", "product_id": "python3-flask-1:1.1.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-flask@1.1.1-2.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-funcsigs-0:1.0.2-17.el8.noarch", "product": { "name": "python3-funcsigs-0:1.0.2-17.el8.noarch", "product_id": "python3-funcsigs-0:1.0.2-17.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-funcsigs@1.0.2-17.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "product": { "name": "python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "product_id": "python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-futurist@2.4.1-0.20220509215250.159d752.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "product": { "name": "python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "product_id": "python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-glanceclient@3.6.0-0.20220509212414.626c500.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "product": { "name": "python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "product_id": "python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-hardware@0.29.0-0.20220216015636.7662a1d.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "product": { "name": "python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "product_id": "python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-hardware-detect@0.29.0-0.20220216015636.7662a1d.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ifaddr-0:0.1.6-6.el8.noarch", "product": { "name": "python3-ifaddr-0:0.1.6-6.el8.noarch", "product_id": "python3-ifaddr-0:0.1.6-6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ifaddr@0.1.6-6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-importlib-metadata-0:1.7.0-2.el8.noarch", "product": { "name": "python3-importlib-metadata-0:1.7.0-2.el8.noarch", "product_id": "python3-importlib-metadata-0:1.7.0-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-importlib-metadata@1.7.0-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "product": { "name": "python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "product_id": "python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-lib@5.1.1-0.20220225151335.e205816.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "product": { "name": "python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "product_id": "python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-prometheus-exporter@3.1.1-0.20220324125409.db1a824.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-iso8601-0:0.1.12-9.el8.noarch", "product": { "name": "python3-iso8601-0:0.1.12-9.el8.noarch", "product_id": "python3-iso8601-0:0.1.12-9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-iso8601@0.1.12-9.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "product": { "name": "python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "product_id": "python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-jsonpath-rw@1.2.3-23.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-jsonschema-0:3.2.0-6.el8.noarch", "product": { "name": "python3-jsonschema-0:3.2.0-6.el8.noarch", "product_id": "python3-jsonschema-0:3.2.0-6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-jsonschema@3.2.0-6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kazoo-0:2.7.0-2.el8.noarch", "product": { "name": "python3-kazoo-0:2.7.0-2.el8.noarch", "product_id": "python3-kazoo-0:2.7.0-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kazoo@2.7.0-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-keyring-0:21.0.0-2.el8.noarch", "product": { "name": "python3-keyring-0:21.0.0-2.el8.noarch", "product_id": "python3-keyring-0:21.0.0-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-keyring@21.0.0-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "product": { "name": "python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "product_id": "python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-keystoneauth1@4.5.0-0.20220509213157.8da0a63.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "product": { "name": "python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "product_id": "python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-keystoneclient@4.4.0-0.20220509200759.100253d.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "product": { "name": "python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "product_id": "python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-keystoneclient-tests@4.4.0-0.20220509200759.100253d.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "product": { "name": "python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "product_id": "python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-keystonemiddleware@9.4.0-0.20220509211054.8a05709.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kombu-1:4.6.6-8.el8.noarch", "product": { "name": "python3-kombu-1:4.6.6-8.el8.noarch", "product_id": "python3-kombu-1:4.6.6-8.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kombu@4.6.6-8.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-logutils-0:0.3.5-7.1.el8.noarch", "product": { "name": "python3-logutils-0:0.3.5-7.1.el8.noarch", "product_id": "python3-logutils-0:0.3.5-7.1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-logutils@0.3.5-7.1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-memcached-0:1.58-12.el8.noarch", "product": { "name": "python3-memcached-0:1.58-12.el8.noarch", "product_id": "python3-memcached-0:1.58-12.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-memcached@1.58-12.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-migrate-0:0.13.0-2.el8.noarch", "product": { "name": "python3-migrate-0:0.13.0-2.el8.noarch", "product_id": "python3-migrate-0:0.13.0-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-migrate@0.13.0-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-munch-0:2.3.2-7.el8.noarch", "product": { "name": "python3-munch-0:2.3.2-7.el8.noarch", "product_id": "python3-munch-0:2.3.2-7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-munch@2.3.2-7.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "product": { "name": "python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "product_id": "python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openstacksdk@0.61.0-0.20220509201549.26c9bc2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "product": { "name": "python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "product_id": "python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-openstacksdk-tests@0.61.0-0.20220509201549.26c9bc2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "product": { "name": "python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "product_id": "python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-os-service-types@1.7.0-0.20220215231659.0b2f473.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "product": { "name": "python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "product_id": "python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-os-traits@2.7.0-0.20220509205801.3d1dbf0.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "product": { "name": "python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "product_id": "python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-os-traits-tests@2.7.0-0.20220509205801.3d1dbf0.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "product": { "name": "python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "product_id": "python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-osc-lib@2.5.0-0.20220509211843.78d276e.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "product": { "name": "python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "product_id": "python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-osc-lib-tests@2.5.0-0.20220509211843.78d276e.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product": { "name": "python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product_id": "python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-cache-lang@2.8.1-0.20220216000746.40946a9.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product": { "name": "python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product_id": "python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-cache@2.8.1-0.20220216000746.40946a9.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product": { "name": "python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product_id": "python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-cache-tests@2.8.1-0.20220216000746.40946a9.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product": { "name": "python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product_id": "python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-concurrency-lang@4.5.1-0.20220509221157.145f060.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product": { "name": "python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product_id": "python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-concurrency@4.5.1-0.20220509221157.145f060.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product": { "name": "python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product_id": "python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-concurrency-tests@4.5.1-0.20220509221157.145f060.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "product": { "name": "python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "product_id": "python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-config@8.8.0-0.20220509202553.64c82a0.el8?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "product": { "name": "python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "product_id": "python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-context@4.1.0-0.20220509205437.3400cc2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "product": { "name": "python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "product_id": "python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-context-tests@4.1.0-0.20220509205437.3400cc2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product": { "name": "python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product_id": "python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-db-lang@9.1.0-0.20220216003829.be2cc6a.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product": { "name": "python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product_id": "python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-db@9.1.0-0.20220216003829.be2cc6a.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product": { "name": "python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product_id": "python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-db-tests@9.1.0-0.20220216003829.be2cc6a.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "product": { "name": "python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "product_id": "python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-i18n-lang@5.1.0-0.20220216011159.b031d17.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "product": { "name": "python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "product_id": "python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-i18n@5.1.0-0.20220216011159.b031d17.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product": { "name": "python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product_id": "python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-log-lang@4.6.0-0.20220216002407.41c8807.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product": { "name": "python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product_id": "python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-log@4.6.0-0.20220216002407.41c8807.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product": { "name": "python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product_id": "python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-log-tests@4.6.0-0.20220216002407.41c8807.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "product": { "name": "python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "product_id": "python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-messaging@12.13.0-0.20220509210748.2d090b5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "product": { "name": "python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "product_id": "python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-messaging-tests@12.13.0-0.20220509210748.2d090b5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "product": { "name": "python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "product_id": "python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-metrics@0.3.0-0.20220216012738.43eee50.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "product": { "name": "python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "product_id": "python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-metrics-tests@0.3.0-0.20220216012738.43eee50.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product": { "name": "python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product_id": "python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-middleware-lang@4.5.1-0.20220509203328.2f72b30.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product": { "name": "python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product_id": "python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-middleware@4.5.1-0.20220509203328.2f72b30.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product": { "name": "python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product_id": "python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-middleware-tests@4.5.1-0.20220509203328.2f72b30.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product": { "name": "python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product_id": "python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-policy-lang@3.12.1-0.20220509221328.9673a74.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product": { "name": "python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product_id": "python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-policy@3.12.1-0.20220509221328.9673a74.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product": { "name": "python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product_id": "python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-policy-tests@3.12.1-0.20220509221328.9673a74.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "product": { "name": "python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "product_id": "python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-rootwrap@6.3.1-0.20220509204453.1b1b960.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "product": { "name": "python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "product_id": "python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-rootwrap-tests@6.3.1-0.20220509204453.1b1b960.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "product": { "name": "python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "product_id": "python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-serialization@4.3.0-0.20220509195921.6910f75.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "product": { "name": "python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "product_id": "python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-serialization-tests@4.3.0-0.20220509195921.6910f75.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "product": { "name": "python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "product_id": "python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-service@2.8.0-0.20220509203713.6552b9a.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "product": { "name": "python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "product_id": "python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-service-tests@2.8.0-0.20220509203713.6552b9a.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "product": { "name": "python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "product_id": "python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-upgradecheck@1.5.0-0.20220509195112.1559e03.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product": { "name": "python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product_id": "python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-utils-lang@4.13.0-0.20220509213520.de4429f.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product": { "name": "python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product_id": "python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-utils@4.13.0-0.20220509213520.de4429f.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product": { "name": "python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product_id": "python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-utils-tests@4.13.0-0.20220509213520.de4429f.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product": { "name": "python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product_id": "python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-oslo-versionedobjects-lang@2.6.0-0.20220509202736.25d34d6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product": { "name": "python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product_id": "python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-versionedobjects@2.6.0-0.20220509202736.25d34d6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product": { "name": "python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product_id": "python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-oslo-versionedobjects-tests@2.6.0-0.20220509202736.25d34d6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "product": { "name": "python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "product_id": "python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-osprofiler@3.4.3-0.20220509214403.3286301.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-packaging-doc-0:20.4-2.el8.noarch", "product": { "name": "python-packaging-doc-0:20.4-2.el8.noarch", "product_id": "python-packaging-doc-0:20.4-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-packaging-doc@20.4-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-packaging-0:20.4-2.el8.noarch", "product": { "name": "python3-packaging-0:20.4-2.el8.noarch", "product_id": "python3-packaging-0:20.4-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-packaging@20.4-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-paste-0:3.2.4-2.el8.noarch", "product": { "name": "python3-paste-0:3.2.4-2.el8.noarch", "product_id": "python3-paste-0:3.2.4-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-paste@3.2.4-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-paste-deploy-0:2.0.1-5.el8.noarch", "product": { "name": "python3-paste-deploy-0:2.0.1-5.el8.noarch", "product_id": "python3-paste-deploy-0:2.0.1-5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-paste-deploy@2.0.1-5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pbr-0:5.5.1-2.el8.noarch", "product": { "name": "python3-pbr-0:5.5.1-2.el8.noarch", "product_id": "python3-pbr-0:5.5.1-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pbr@5.5.1-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pecan-0:1.3.2-10.el8.noarch", "product": { "name": "python3-pecan-0:1.3.2-10.el8.noarch", "product_id": "python3-pecan-0:1.3.2-10.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pecan@1.3.2-10.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pexpect-0:4.6-3.el8.noarch", "product": { "name": "python3-pexpect-0:4.6-3.el8.noarch", "product_id": "python3-pexpect-0:4.6-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pexpect@4.6-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "product": { "name": "python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "product_id": "python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-proliantutils@2.13.2-0.20220509214147.8c7b6b1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-prometheus_client-0:0.7.1-3.el8.noarch", "product": { "name": "python3-prometheus_client-0:0.7.1-3.el8.noarch", "product_id": "python3-prometheus_client-0:0.7.1-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-prometheus_client@0.7.1-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "product": { "name": "python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "product_id": "python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pycadf-common@3.1.1-0.20220215232623.4179996.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "product": { "name": "python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "product_id": "python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pycadf@3.1.1-0.20220215232623.4179996.el8?arch=noarch" } } }, { "category": "product_version", "name": "pycdlib-tools-0:1.11.0-4.el8.noarch", "product": { "name": "pycdlib-tools-0:1.11.0-4.el8.noarch", "product_id": "pycdlib-tools-0:1.11.0-4.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/pycdlib-tools@1.11.0-4.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pycdlib-0:1.11.0-4.el8.noarch", "product": { "name": "python3-pycdlib-0:1.11.0-4.el8.noarch", "product_id": "python3-pycdlib-0:1.11.0-4.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pycdlib@1.11.0-4.el8?arch=noarch" } } }, { "category": "product_version", "name": "python-pyperclip-doc-0:1.6.4-7.el8.noarch", "product": { "name": "python-pyperclip-doc-0:1.6.4-7.el8.noarch", "product_id": "python-pyperclip-doc-0:1.6.4-7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-pyperclip-doc@1.6.4-7.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pyperclip-0:1.6.4-7.el8.noarch", "product": { "name": "python3-pyperclip-0:1.6.4-7.el8.noarch", "product_id": "python3-pyperclip-0:1.6.4-7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pyperclip@1.6.4-7.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-redis-0:3.3.8-2.el8.noarch", "product": { "name": "python3-redis-0:3.3.8-2.el8.noarch", "product_id": "python3-redis-0:3.3.8-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-redis@3.3.8-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-repoze-lru-0:0.7-7.el8.noarch", "product": { "name": "python3-repoze-lru-0:0.7-7.el8.noarch", "product_id": "python3-repoze-lru-0:0.7-7.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-repoze-lru@0.7-7.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "product": { "name": "python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "product_id": "python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-requestsexceptions@1.4.0-0.20220215231659.d7ac0ff.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-retrying-0:1.2.3-22.el8.noarch", "product": { "name": "python3-retrying-0:1.2.3-22.el8.noarch", "product_id": "python3-retrying-0:1.2.3-22.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-retrying@1.2.3-22.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-rfc3986-0:1.2.0-6.el8.noarch", "product": { "name": "python3-rfc3986-0:1.2.0-6.el8.noarch", "product_id": "python3-rfc3986-0:1.2.0-6.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-rfc3986@1.2.0-6.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-routes-0:2.4.1-12.el8.noarch", "product": { "name": "python3-routes-0:2.4.1-12.el8.noarch", "product_id": "python3-routes-0:2.4.1-12.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-routes@2.4.1-12.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "product": { "name": "python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "product_id": "python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-scciclient@0.11.1-0.20220216020832.a84332b.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-simplegeneric-0:0.8.1-18.el8.noarch", "product": { "name": "python3-simplegeneric-0:0.8.1-18.el8.noarch", "product_id": "python3-simplegeneric-0:0.8.1-18.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-simplegeneric@0.8.1-18.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-singledispatch-0:3.4.0.3-19.el8.noarch", "product": { "name": "python3-singledispatch-0:3.4.0.3-19.el8.noarch", "product_id": "python3-singledispatch-0:3.4.0.3-19.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-singledispatch@3.4.0.3-19.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-six-0:1.15.0-3.el8.noarch", "product": { "name": "python3-six-0:1.15.0-3.el8.noarch", "product_id": "python3-six-0:1.15.0-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-six@1.15.0-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-soupsieve-0:2.1.0-2.el8.noarch", "product": { "name": "python3-soupsieve-0:2.1.0-2.el8.noarch", "product_id": "python3-soupsieve-0:2.1.0-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-soupsieve@2.1.0-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sqlparse-0:0.2.4-10.el8.noarch", "product": { "name": "python3-sqlparse-0:0.2.4-10.el8.noarch", "product_id": "python3-sqlparse-0:0.2.4-10.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sqlparse@0.2.4-10.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-statsd-0:3.2.1-17.el8.noarch", "product": { "name": "python3-statsd-0:3.2.1-17.el8.noarch", "product_id": "python3-statsd-0:3.2.1-17.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-statsd@3.2.1-17.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "product": { "name": "python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "product_id": "python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-stevedore@3.5.0-0.20220509195112.442f157.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "product": { "name": "python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "product_id": "python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy@4.1.1-0.20220302175405.c769149.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "product": { "name": "python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "product_id": "python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-tests@4.1.1-0.20220302175405.c769149.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "product": { "name": "python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "product_id": "python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac@4.0.0-0.20220324125409.7b75e6e.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "product": { "name": "python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "product_id": "python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-sushy-oem-idrac-tests@4.0.0-0.20220324125409.7b75e6e.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "product": { "name": "python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "product_id": "python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-swiftclient@3.13.1-0.20220509204112.4989d94.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-tempita-0:0.5.1-25.el8.noarch", "product": { "name": "python3-tempita-0:0.5.1-25.el8.noarch", "product_id": "python3-tempita-0:0.5.1-25.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-tempita@0.5.1-25.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-tenacity-0:6.2.0-2.el8.noarch", "product": { "name": "python3-tenacity-0:6.2.0-2.el8.noarch", "product_id": "python3-tenacity-0:6.2.0-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-tenacity@6.2.0-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "product": { "name": "python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "product_id": "python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-tooz@2.11.1-0.20220509215238.96f91b9.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-vine-0:1.3.0-5.el8.noarch", "product": { "name": "python3-vine-0:1.3.0-5.el8.noarch", "product_id": "python3-vine-0:1.3.0-5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-vine@1.3.0-5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-voluptuous-0:0.11.7-3.el8.noarch", "product": { "name": "python3-voluptuous-0:0.11.7-3.el8.noarch", "product_id": "python3-voluptuous-0:0.11.7-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-voluptuous@0.11.7-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-waitress-0:2.0.0-2.el8.noarch", "product": { "name": "python3-waitress-0:2.0.0-2.el8.noarch", "product_id": "python3-waitress-0:2.0.0-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-waitress@2.0.0-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-warlock-0:1.3.3-2.el8.noarch", "product": { "name": "python3-warlock-0:1.3.3-2.el8.noarch", "product_id": "python3-warlock-0:1.3.3-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-warlock@1.3.3-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-wcwidth-0:0.1.7-15.el8.noarch", "product": { "name": "python3-wcwidth-0:0.1.7-15.el8.noarch", "product_id": "python3-wcwidth-0:0.1.7-15.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-wcwidth@0.1.7-15.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-webob-0:1.8.5-5.el8.noarch", "product": { "name": "python3-webob-0:1.8.5-5.el8.noarch", "product_id": "python3-webob-0:1.8.5-5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-webob@1.8.5-5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-webtest-0:2.0.33-5.el8.noarch", "product": { "name": "python3-webtest-0:2.0.33-5.el8.noarch", "product_id": "python3-webtest-0:2.0.33-5.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-webtest@2.0.33-5.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-werkzeug-0:2.0.3-1.el8.noarch", "product": { "name": "python3-werkzeug-0:2.0.3-1.el8.noarch", "product_id": "python3-werkzeug-0:2.0.3-1.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-werkzeug@2.0.3-1.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "product": { "name": "python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "product_id": "python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-wsme@0.11.0-0.20220216004816.80bda90.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-zake-0:0.2.2-19.el8.noarch", "product": { "name": "python3-zake-0:0.2.2-19.el8.noarch", "product_id": "python3-zake-0:0.2.2-19.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-zake@0.2.2-19.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-zeroconf-0:0.24.4-2.el8.noarch", "product": { "name": "python3-zeroconf-0:0.24.4-2.el8.noarch", "product_id": "python3-zeroconf-0:0.24.4-2.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-zeroconf@0.24.4-2.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-zipp-0:0.5.1-3.el8.noarch", "product": { "name": "python3-zipp-0:0.5.1-3.el8.noarch", "product_id": "python3-zipp-0:0.5.1-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-zipp@0.5.1-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product": { "name": "openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_id": "openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-api@20.2.1-0.20220628175043.b5ed57a.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product": { "name": "openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_id": "openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-common@20.2.1-0.20220628175043.b5ed57a.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product": { "name": "openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_id": "openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-ironic-conductor@20.2.1-0.20220628175043.b5ed57a.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product": { "name": "python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_id": "python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-ironic-tests@20.2.1-0.20220628175043.b5ed57a.el8?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "python3-dataclasses-0:0.8-3.el8.noarch", "product": { "name": "python3-dataclasses-0:0.8-3.el8.noarch", "product_id": "python3-dataclasses-0:0.8-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-dataclasses@0.8-3.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-pint-0:0.10.1-3.el8.noarch", "product": { "name": "python3-pint-0:0.10.1-3.el8.noarch", "product_id": "python3-pint-0:0.10.1-3.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-pint@0.10.1-3.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64" }, "product_reference": "afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le" }, "product_reference": "afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x" }, "product_reference": "afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64" }, "product_reference": "afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64" }, "product_reference": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le" }, "product_reference": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x" }, "product_reference": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64" }, "product_reference": "afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64" }, "product_reference": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le" }, "product_reference": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x" }, "product_reference": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src" }, "product_reference": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64" }, "product_reference": "atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64" }, "product_reference": "bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64" }, "product_reference": "bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64" }, "product_reference": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64" }, "product_reference": "bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64" }, "product_reference": "buildah-1:1.23.4-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le" }, "product_reference": "buildah-1:1.23.4-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x" }, "product_reference": "buildah-1:1.23.4-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-2.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src" }, "product_reference": "buildah-1:1.23.4-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64" }, "product_reference": "buildah-1:1.23.4-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64" }, "product_reference": "buildah-debuginfo-1:1.23.4-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x" }, "product_reference": "buildah-debuginfo-1:1.23.4-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64" }, "product_reference": "buildah-debuginfo-1:1.23.4-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64" }, "product_reference": "buildah-debugsource-1:1.23.4-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le" }, "product_reference": "buildah-debugsource-1:1.23.4-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x" }, "product_reference": "buildah-debugsource-1:1.23.4-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64" }, "product_reference": "buildah-debugsource-1:1.23.4-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64" }, "product_reference": "buildah-tests-1:1.23.4-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le" }, "product_reference": "buildah-tests-1:1.23.4-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x" }, "product_reference": "buildah-tests-1:1.23.4-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64" }, "product_reference": "buildah-tests-1:1.23.4-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64" }, "product_reference": "butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le" }, "product_reference": "butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x" }, "product_reference": "butane-0:0.15.0-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src" }, "product_reference": "butane-0:0.15.0-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-0:0.15.0-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64" }, "product_reference": "butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64" }, "product_reference": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le" }, "product_reference": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x" }, "product_reference": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64" }, "product_reference": "butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64" }, "product_reference": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le" }, "product_reference": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x" }, "product_reference": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64" }, "product_reference": "butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch" }, "product_reference": "butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64" }, "product_reference": "conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le" }, "product_reference": "conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x" }, "product_reference": "conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src" }, "product_reference": "conmon-2:2.1.2-2.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64" }, "product_reference": "conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64" }, "product_reference": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le" }, "product_reference": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x" }, "product_reference": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64" }, "product_reference": "conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64" }, "product_reference": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le" }, "product_reference": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x" }, "product_reference": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64" }, "product_reference": "conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch" }, "product_reference": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src" }, "product_reference": "console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch" }, "product_reference": "console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch" }, "product_reference": "console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch" }, "product_reference": "container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.188.0-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src" }, "product_reference": "container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64" }, "product_reference": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le" }, "product_reference": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x" }, "product_reference": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src" }, "product_reference": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64" }, "product_reference": "containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-21.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch" }, "product_reference": "containers-common-2:1-21.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-21.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src" }, "product_reference": "containers-common-2:1-21.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x" }, "product_reference": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src" }, "product_reference": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x" }, "product_reference": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x" }, "product_reference": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64" }, "product_reference": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le" }, "product_reference": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x" }, "product_reference": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src" }, "product_reference": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64" }, "product_reference": "cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64" }, "product_reference": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64" }, "product_reference": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.24.2-4.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64" }, "product_reference": "cri-tools-0:1.24.2-4.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.24.2-4.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le" }, "product_reference": "cri-tools-0:1.24.2-4.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.24.2-4.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x" }, "product_reference": "cri-tools-0:1.24.2-4.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.24.2-4.1.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src" }, "product_reference": "cri-tools-0:1.24.2-4.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-0:1.24.2-4.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64" }, "product_reference": "cri-tools-0:1.24.2-4.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64" }, "product_reference": "cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le" }, "product_reference": "cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x" }, "product_reference": "cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64" }, "product_reference": "cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64" }, "product_reference": "cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le" }, "product_reference": "cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x" }, "product_reference": "cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64" }, "product_reference": "cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "crit-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "crit-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "crit-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "crit-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "criu-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "criu-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "criu-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src" }, "product_reference": "criu-0:3.15-4.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "criu-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64" }, "product_reference": "crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le" }, "product_reference": "crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x" }, "product_reference": "crun-0:1.4.2-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src" }, "product_reference": "crun-0:1.4.2-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.4.2-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64" }, "product_reference": "crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64" }, "product_reference": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le" }, "product_reference": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x" }, "product_reference": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64" }, "product_reference": "crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64" }, "product_reference": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le" }, "product_reference": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x" }, "product_reference": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64" }, "product_reference": "crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64" }, "product_reference": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le" }, "product_reference": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x" }, "product_reference": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src" }, "product_reference": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64" }, "product_reference": "fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-0:2.2.24-1.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src" }, "product_reference": "haproxy-0:2.2.24-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.24-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64" }, "product_reference": "haproxy-debugsource-0:2.2.24-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.24-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le" }, "product_reference": "haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.24-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x" }, "product_reference": "haproxy-debugsource-0:2.2.24-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy-debugsource-0:2.2.24-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64" }, "product_reference": "haproxy-debugsource-0:2.2.24-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-0:2.2.24-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64" }, "product_reference": "haproxy22-0:2.2.24-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-0:2.2.24-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le" }, "product_reference": "haproxy22-0:2.2.24-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-0:2.2.24-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x" }, "product_reference": "haproxy22-0:2.2.24-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-0:2.2.24-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64" }, "product_reference": "haproxy22-0:2.2.24-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64" }, "product_reference": "haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le" }, "product_reference": "haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x" }, "product_reference": "haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "haproxy22-debuginfo-0:2.2.24-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64" }, "product_reference": "haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64" }, "product_reference": "ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le" }, "product_reference": "ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x" }, "product_reference": "ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src" }, "product_reference": "ignition-0:2.14.0-3.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-0:2.14.0-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64" }, "product_reference": "ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64" }, "product_reference": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le" }, "product_reference": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x" }, "product_reference": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64" }, "product_reference": "ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64" }, "product_reference": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le" }, "product_reference": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x" }, "product_reference": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64" }, "product_reference": "ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64" }, "product_reference": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le" }, "product_reference": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x" }, "product_reference": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64" }, "product_reference": "ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64" }, "product_reference": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le" }, "product_reference": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x" }, "product_reference": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64" }, "product_reference": "ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.4.2-1.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64" }, "product_reference": "kata-containers-0:2.4.2-1.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.4.2-1.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le" }, "product_reference": "kata-containers-0:2.4.2-1.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.4.2-1.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src" }, "product_reference": "kata-containers-0:2.4.2-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "kata-containers-0:2.4.2-1.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64" }, "product_reference": "kata-containers-0:2.4.2-1.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x" }, "product_reference": "libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src" }, "product_reference": "libslirp-0:4.4.0-2.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x" }, "product_reference": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x" }, "product_reference": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64" }, "product_reference": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le" }, "product_reference": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x" }, "product_reference": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64" }, "product_reference": "libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src" }, "product_reference": "openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64" }, "product_reference": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64" }, "product_reference": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src" }, "product_reference": "openvswitch2.17-0:2.17.0-22.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch" }, "product_reference": "openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.0-37.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src" }, "product_reference": "ovn22.03-0:22.03.0-37.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64" }, "product_reference": "ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-0:22.06.0-27.el8fdp.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src" }, "product_reference": "ovn22.06-0:22.06.0-27.el8fdp.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64" }, "product_reference": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le" }, "product_reference": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x" }, "product_reference": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64" }, "product_reference": "ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src" }, "product_reference": "podman-2:4.0.2-6.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch" }, "product_reference": "podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64" }, "product_reference": "podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x" }, "product_reference": "podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64" }, "product_reference": "podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64" }, "product_reference": "python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le" }, "product_reference": "python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x" }, "product_reference": "python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64" }, "product_reference": "python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64" }, "product_reference": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le" }, "product_reference": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x" }, "product_reference": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64" }, "product_reference": "python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64" }, "product_reference": "runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le" }, "product_reference": "runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x" }, "product_reference": "runc-3:1.1.2-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src" }, "product_reference": "runc-3:1.1.2-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64" }, "product_reference": "runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64" }, "product_reference": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le" }, "product_reference": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x" }, "product_reference": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64" }, "product_reference": "runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64" }, "product_reference": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le" }, "product_reference": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x" }, "product_reference": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64" }, "product_reference": "runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src" }, "product_reference": "rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64" }, "product_reference": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le" }, "product_reference": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x" }, "product_reference": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64" }, "product_reference": "rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src" }, "product_reference": "rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64" }, "product_reference": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64" }, "product_reference": "rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src" }, "product_reference": "skopeo-2:1.5.2-3.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64" }, "product_reference": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le" }, "product_reference": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x" }, "product_reference": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src" }, "product_reference": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64" }, "product_reference": "slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64" }, "product_reference": "slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.9-1.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch" }, "product_reference": "toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.9-1.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src" }, "product_reference": "toolbox-0:0.0.9-1.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-5.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64" }, "product_reference": "libsodium-0:1.0.16-5.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-5.el8.ppc64le as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le" }, "product_reference": "libsodium-0:1.0.16-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-5.el8.s390x as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x" }, "product_reference": "libsodium-0:1.0.16-5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src" }, "product_reference": "libsodium-0:1.0.16-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-0:1.0.16-5.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64" }, "product_reference": "libsodium-0:1.0.16-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-5.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64" }, "product_reference": "libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debuginfo-0:1.0.16-5.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64" }, "product_reference": "libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-5.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64" }, "product_reference": "libsodium-debugsource-0:1.0.16-5.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-debugsource-0:1.0.16-5.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64" }, "product_reference": "libsodium-debugsource-0:1.0.16-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-5.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64" }, "product_reference": "libsodium-devel-0:1.0.16-5.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-5.el8.ppc64le as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le" }, "product_reference": "libsodium-devel-0:1.0.16-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-5.el8.s390x as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x" }, "product_reference": "libsodium-devel-0:1.0.16-5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-devel-0:1.0.16-5.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64" }, "product_reference": "libsodium-devel-0:1.0.16-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-5.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64" }, "product_reference": "libsodium-static-0:1.0.16-5.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-5.el8.ppc64le as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le" }, "product_reference": "libsodium-static-0:1.0.16-5.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-5.el8.s390x as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x" }, "product_reference": "libsodium-static-0:1.0.16-5.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "libsodium-static-0:1.0.16-5.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64" }, "product_reference": "libsodium-static-0:1.0.16-5.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src" }, "product_reference": "openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch" }, "product_reference": "openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch" }, "product_reference": "openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch" }, "product_reference": "openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch" }, "product_reference": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src" }, "product_reference": "openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch" }, "product_reference": "openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch" }, "product_reference": "openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch" }, "product_reference": "openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch" }, "product_reference": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src" }, "product_reference": "openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "pycdlib-tools-0:1.11.0-4.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch" }, "product_reference": "pycdlib-tools-0:1.11.0-4.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "pyparsing-0:2.3.1-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src" }, "product_reference": "pyparsing-0:2.3.1-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "pysnmp-0:4.4.8-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src" }, "product_reference": "pysnmp-0:4.4.8-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-SecretStorage-0:2.3.1-9.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src" }, "product_reference": "python-SecretStorage-0:2.3.1-9.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-alembic-0:1.4.2-6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src" }, "product_reference": "python-alembic-0:1.4.2-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-amqp-0:2.5.2-8.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src" }, "product_reference": "python-amqp-0:2.5.2-8.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-amqp-doc-0:2.5.2-8.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch" }, "product_reference": "python-amqp-doc-0:2.5.2-8.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-appdirs-0:1.4.0-8.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src" }, "product_reference": "python-appdirs-0:1.4.0-8.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src" }, "product_reference": "python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-bcrypt-0:3.1.6-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src" }, "product_reference": "python-bcrypt-0:3.1.6-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64" }, "product_reference": "python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64" }, "product_reference": "python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-beautifulsoup4-0:4.9.3-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src" }, "product_reference": "python-beautifulsoup4-0:4.9.3-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-cachetools-0:3.1.0-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src" }, "product_reference": "python-cachetools-0:3.1.0-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src" }, "product_reference": "python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src" }, "product_reference": "python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-colorama-0:0.4.1-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src" }, "product_reference": "python-colorama-0:0.4.1-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-construct-0:2.10.56-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src" }, "product_reference": "python-construct-0:2.10.56-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-dataclasses-0:0.8-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src" }, "product_reference": "python-dataclasses-0:0.8-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src" }, "product_reference": "python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-decorator-0:4.4.0-6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src" }, "product_reference": "python-decorator-0:4.4.0-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-dogpile-cache-0:1.1.2-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src" }, "product_reference": "python-dogpile-cache-0:1.1.2-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src" }, "product_reference": "python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-editor-0:1.0.4-5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src" }, "product_reference": "python-editor-0:1.0.4-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-fasteners-0:0.14.1-21.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src" }, "product_reference": "python-fasteners-0:0.14.1-21.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-flask-1:1.1.1-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src" }, "product_reference": "python-flask-1:1.1.1-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-flask-doc-1:1.1.1-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch" }, "product_reference": "python-flask-doc-1:1.1.1-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-funcsigs-0:1.0.2-17.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src" }, "product_reference": "python-funcsigs-0:1.0.2-17.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src" }, "product_reference": "python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src" }, "product_reference": "python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-greenlet-0:0.4.14-6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src" }, "product_reference": "python-greenlet-0:0.4.14-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-greenlet-debugsource-0:0.4.14-6.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64" }, "product_reference": "python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-greenlet-debugsource-0:0.4.14-6.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64" }, "product_reference": "python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src" }, "product_reference": "python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-ifaddr-0:0.1.6-6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src" }, "product_reference": "python-ifaddr-0:0.1.6-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-importlib-metadata-0:1.7.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src" }, "product_reference": "python-importlib-metadata-0:1.7.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src" }, "product_reference": "python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src" }, "product_reference": "python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-iso8601-0:0.1.12-9.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src" }, "product_reference": "python-iso8601-0:0.1.12-9.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-jsonpath-rw-0:1.2.3-23.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src" }, "product_reference": "python-jsonpath-rw-0:1.2.3-23.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-jsonschema-0:3.2.0-6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src" }, "product_reference": "python-jsonschema-0:3.2.0-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-kazoo-0:2.7.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src" }, "product_reference": "python-kazoo-0:2.7.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-keyring-0:21.0.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src" }, "product_reference": "python-keyring-0:21.0.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src" }, "product_reference": "python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src" }, "product_reference": "python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src" }, "product_reference": "python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-kombu-1:4.6.6-8.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src" }, "product_reference": "python-kombu-1:4.6.6-8.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-logutils-0:0.3.5-7.1.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src" }, "product_reference": "python-logutils-0:0.3.5-7.1.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-memcached-0:1.58-12.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src" }, "product_reference": "python-memcached-0:1.58-12.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-migrate-0:0.13.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src" }, "product_reference": "python-migrate-0:0.13.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-msgpack-0:0.6.2-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src" }, "product_reference": "python-msgpack-0:0.6.2-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-msgpack-debugsource-0:0.6.2-2.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64" }, "product_reference": "python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-msgpack-debugsource-0:0.6.2-2.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64" }, "product_reference": "python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-munch-0:2.3.2-7.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src" }, "product_reference": "python-munch-0:2.3.2-7.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src" }, "product_reference": "python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src" }, "product_reference": "python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src" }, "product_reference": "python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src" }, "product_reference": "python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src" }, "product_reference": "python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch" }, "product_reference": "python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src" }, "product_reference": "python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch" }, "product_reference": "python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src" }, "product_reference": "python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src" }, "product_reference": "python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src" }, "product_reference": "python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch" }, "product_reference": "python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src" }, "product_reference": "python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch" }, "product_reference": "python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src" }, "product_reference": "python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch" }, "product_reference": "python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src" }, "product_reference": "python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src" }, "product_reference": "python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src" }, "product_reference": "python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch" }, "product_reference": "python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src" }, "product_reference": "python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch" }, "product_reference": "python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src" }, "product_reference": "python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src" }, "product_reference": "python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src" }, "product_reference": "python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src" }, "product_reference": "python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src" }, "product_reference": "python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch" }, "product_reference": "python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src" }, "product_reference": "python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch" }, "product_reference": "python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src" }, "product_reference": "python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-packaging-0:20.4-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src" }, "product_reference": "python-packaging-0:20.4-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-packaging-doc-0:20.4-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch" }, "product_reference": "python-packaging-doc-0:20.4-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-paste-0:3.2.4-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src" }, "product_reference": "python-paste-0:3.2.4-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-paste-deploy-0:2.0.1-5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src" }, "product_reference": "python-paste-deploy-0:2.0.1-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pbr-0:5.5.1-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src" }, "product_reference": "python-pbr-0:5.5.1-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pecan-0:1.3.2-10.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src" }, "product_reference": "python-pecan-0:1.3.2-10.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pexpect-0:4.6-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src" }, "product_reference": "python-pexpect-0:4.6-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pint-0:0.10.1-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src" }, "product_reference": "python-pint-0:0.10.1-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src" }, "product_reference": "python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-prometheus_client-0:0.7.1-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src" }, "product_reference": "python-prometheus_client-0:0.7.1-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src" }, "product_reference": "python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch" }, "product_reference": "python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pycdlib-0:1.11.0-4.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src" }, "product_reference": "python-pycdlib-0:1.11.0-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pynacl-0:1.3.0-6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src" }, "product_reference": "python-pynacl-0:1.3.0-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pynacl-debugsource-0:1.3.0-6.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64" }, "product_reference": "python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pynacl-debugsource-0:1.3.0-6.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64" }, "product_reference": "python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyperclip-0:1.6.4-7.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src" }, "product_reference": "python-pyperclip-0:1.6.4-7.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyperclip-doc-0:1.6.4-7.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch" }, "product_reference": "python-pyperclip-doc-0:1.6.4-7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyrsistent-0:0.16.0-4.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src" }, "product_reference": "python-pyrsistent-0:0.16.0-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64" }, "product_reference": "python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64" }, "product_reference": "python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-redis-0:3.3.8-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src" }, "product_reference": "python-redis-0:3.3.8-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-repoze-lru-0:0.7-7.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src" }, "product_reference": "python-repoze-lru-0:0.7-7.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src" }, "product_reference": "python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-retrying-0:1.2.3-22.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src" }, "product_reference": "python-retrying-0:1.2.3-22.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-rfc3986-0:1.2.0-6.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src" }, "product_reference": "python-rfc3986-0:1.2.0-6.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-routes-0:2.4.1-12.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src" }, "product_reference": "python-routes-0:2.4.1-12.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src" }, "product_reference": "python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-simplegeneric-0:0.8.1-18.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src" }, "product_reference": "python-simplegeneric-0:0.8.1-18.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-simplejson-0:3.17.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src" }, "product_reference": "python-simplejson-0:3.17.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-simplejson-debugsource-0:3.17.0-2.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64" }, "product_reference": "python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-simplejson-debugsource-0:3.17.0-2.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64" }, "product_reference": "python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-singledispatch-0:3.4.0.3-19.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src" }, "product_reference": "python-singledispatch-0:3.4.0.3-19.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-six-0:1.15.0-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src" }, "product_reference": "python-six-0:1.15.0-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-soupsieve-0:2.1.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src" }, "product_reference": "python-soupsieve-0:2.1.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-sqlparse-0:0.2.4-10.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src" }, "product_reference": "python-sqlparse-0:0.2.4-10.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-statsd-0:3.2.1-17.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src" }, "product_reference": "python-statsd-0:3.2.1-17.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src" }, "product_reference": "python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src" }, "product_reference": "python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src" }, "product_reference": "python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src" }, "product_reference": "python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-tempita-0:0.5.1-25.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src" }, "product_reference": "python-tempita-0:0.5.1-25.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-tenacity-0:6.2.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src" }, "product_reference": "python-tenacity-0:6.2.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src" }, "product_reference": "python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-vine-0:1.3.0-5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src" }, "product_reference": "python-vine-0:1.3.0-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-voluptuous-0:0.11.7-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src" }, "product_reference": "python-voluptuous-0:0.11.7-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-waitress-0:2.0.0-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src" }, "product_reference": "python-waitress-0:2.0.0-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-warlock-0:1.3.3-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src" }, "product_reference": "python-warlock-0:1.3.3-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-wcwidth-0:0.1.7-15.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src" }, "product_reference": "python-wcwidth-0:0.1.7-15.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-webob-0:1.8.5-5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src" }, "product_reference": "python-webob-0:1.8.5-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-webtest-0:2.0.33-5.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src" }, "product_reference": "python-webtest-0:2.0.33-5.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-werkzeug-0:2.0.3-1.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src" }, "product_reference": "python-werkzeug-0:2.0.3-1.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-wrapt-0:1.11.2-4.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src" }, "product_reference": "python-wrapt-0:1.11.2-4.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-wrapt-debugsource-0:1.11.2-4.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64" }, "product_reference": "python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-wrapt-debugsource-0:1.11.2-4.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64" }, "product_reference": "python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-wrapt-doc-0:1.11.2-4.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64" }, "product_reference": "python-wrapt-doc-0:1.11.2-4.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-wrapt-doc-0:1.11.2-4.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64" }, "product_reference": "python-wrapt-doc-0:1.11.2-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src" }, "product_reference": "python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-yappi-0:1.0-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src" }, "product_reference": "python-yappi-0:1.0-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-yappi-debugsource-0:1.0-3.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64" }, "product_reference": "python-yappi-debugsource-0:1.0-3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-yappi-debugsource-0:1.0-3.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64" }, "product_reference": "python-yappi-debugsource-0:1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-zake-0:0.2.2-19.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src" }, "product_reference": "python-zake-0:0.2.2-19.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-zeroconf-0:0.24.4-2.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src" }, "product_reference": "python-zeroconf-0:0.24.4-2.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python-zipp-0:0.5.1-3.el8.src as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src" }, "product_reference": "python-zipp-0:0.5.1-3.el8.src", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python2-pyparsing-0:2.3.1-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch" }, "product_reference": "python2-pyparsing-0:2.3.1-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-SecretStorage-0:2.3.1-9.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch" }, "product_reference": "python3-SecretStorage-0:2.3.1-9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-alembic-0:1.4.2-6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch" }, "product_reference": "python3-alembic-0:1.4.2-6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-amqp-0:2.5.2-8.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch" }, "product_reference": "python3-amqp-0:2.5.2-8.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-appdirs-0:1.4.0-8.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch" }, "product_reference": "python3-appdirs-0:1.4.0-8.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch" }, "product_reference": "python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bcrypt-0:3.1.6-3.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64" }, "product_reference": "python3-bcrypt-0:3.1.6-3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bcrypt-0:3.1.6-3.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64" }, "product_reference": "python3-bcrypt-0:3.1.6-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64" }, "product_reference": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64" }, "product_reference": "python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-beautifulsoup4-0:4.9.3-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch" }, "product_reference": "python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cachetools-0:3.1.0-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch" }, "product_reference": "python3-cachetools-0:3.1.0-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch" }, "product_reference": "python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch" }, "product_reference": "python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch" }, "product_reference": "python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-colorama-0:0.4.1-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch" }, "product_reference": "python3-colorama-0:0.4.1-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-construct-0:2.10.56-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch" }, "product_reference": "python3-construct-0:2.10.56-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-dataclasses-0:0.8-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch" }, "product_reference": "python3-dataclasses-0:0.8-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch" }, "product_reference": "python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-decorator-0:4.4.0-6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch" }, "product_reference": "python3-decorator-0:4.4.0-6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-dogpile-cache-0:1.1.2-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch" }, "product_reference": "python3-dogpile-cache-0:1.1.2-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch" }, "product_reference": "python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-editor-0:1.0.4-5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch" }, "product_reference": "python3-editor-0:1.0.4-5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-fasteners-0:0.14.1-21.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch" }, "product_reference": "python3-fasteners-0:0.14.1-21.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-flask-1:1.1.1-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch" }, "product_reference": "python3-flask-1:1.1.1-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-funcsigs-0:1.0.2-17.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch" }, "product_reference": "python3-funcsigs-0:1.0.2-17.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch" }, "product_reference": "python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch" }, "product_reference": "python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-greenlet-0:0.4.14-6.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64" }, "product_reference": "python3-greenlet-0:0.4.14-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-greenlet-0:0.4.14-6.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64" }, "product_reference": "python3-greenlet-0:0.4.14-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64" }, "product_reference": "python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64" }, "product_reference": "python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-greenlet-devel-0:0.4.14-6.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64" }, "product_reference": "python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-greenlet-devel-0:0.4.14-6.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64" }, "product_reference": "python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch" }, "product_reference": "python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch" }, "product_reference": "python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ifaddr-0:0.1.6-6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch" }, "product_reference": "python3-ifaddr-0:0.1.6-6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-importlib-metadata-0:1.7.0-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch" }, "product_reference": "python3-importlib-metadata-0:1.7.0-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch" }, "product_reference": "python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch" }, "product_reference": "python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch" }, "product_reference": "python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch" }, "product_reference": "python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch" }, "product_reference": "python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-iso8601-0:0.1.12-9.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch" }, "product_reference": "python3-iso8601-0:0.1.12-9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-jsonpath-rw-0:1.2.3-23.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch" }, "product_reference": "python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-jsonschema-0:3.2.0-6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch" }, "product_reference": "python3-jsonschema-0:3.2.0-6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kazoo-0:2.7.0-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch" }, "product_reference": "python3-kazoo-0:2.7.0-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-keyring-0:21.0.0-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch" }, "product_reference": "python3-keyring-0:21.0.0-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch" }, "product_reference": "python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch" }, "product_reference": "python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch" }, "product_reference": "python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch" }, "product_reference": "python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kombu-1:4.6.6-8.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch" }, "product_reference": "python3-kombu-1:4.6.6-8.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-logutils-0:0.3.5-7.1.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch" }, "product_reference": "python3-logutils-0:0.3.5-7.1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-memcached-0:1.58-12.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch" }, "product_reference": "python3-memcached-0:1.58-12.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-migrate-0:0.13.0-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch" }, "product_reference": "python3-migrate-0:0.13.0-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-msgpack-0:0.6.2-2.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64" }, "product_reference": "python3-msgpack-0:0.6.2-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-msgpack-0:0.6.2-2.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64" }, "product_reference": "python3-msgpack-0:0.6.2-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64" }, "product_reference": "python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64" }, "product_reference": "python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-munch-0:2.3.2-7.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch" }, "product_reference": "python3-munch-0:2.3.2-7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch" }, "product_reference": "python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch" }, "product_reference": "python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch" }, "product_reference": "python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch" }, "product_reference": "python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch" }, "product_reference": "python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch" }, "product_reference": "python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch" }, "product_reference": "python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch" }, "product_reference": "python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch" }, "product_reference": "python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch" }, "product_reference": "python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch" }, "product_reference": "python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch" }, "product_reference": "python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch" }, "product_reference": "python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch" }, "product_reference": "python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch" }, "product_reference": "python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch" }, "product_reference": "python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch" }, "product_reference": "python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch" }, "product_reference": "python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch" }, "product_reference": "python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch" }, "product_reference": "python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch" }, "product_reference": "python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch" }, "product_reference": "python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch" }, "product_reference": "python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch" }, "product_reference": "python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch" }, "product_reference": "python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch" }, "product_reference": "python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch" }, "product_reference": "python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch" }, "product_reference": "python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch" }, "product_reference": "python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch" }, "product_reference": "python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch" }, "product_reference": "python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch" }, "product_reference": "python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch" }, "product_reference": "python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch" }, "product_reference": "python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch" }, "product_reference": "python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch" }, "product_reference": "python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch" }, "product_reference": "python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch" }, "product_reference": "python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch" }, "product_reference": "python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-packaging-0:20.4-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch" }, "product_reference": "python3-packaging-0:20.4-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-paste-0:3.2.4-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch" }, "product_reference": "python3-paste-0:3.2.4-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-paste-deploy-0:2.0.1-5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch" }, "product_reference": "python3-paste-deploy-0:2.0.1-5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pbr-0:5.5.1-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch" }, "product_reference": "python3-pbr-0:5.5.1-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pecan-0:1.3.2-10.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch" }, "product_reference": "python3-pecan-0:1.3.2-10.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pexpect-0:4.6-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch" }, "product_reference": "python3-pexpect-0:4.6-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pint-0:0.10.1-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch" }, "product_reference": "python3-pint-0:0.10.1-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch" }, "product_reference": "python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-prometheus_client-0:0.7.1-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch" }, "product_reference": "python3-prometheus_client-0:0.7.1-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch" }, "product_reference": "python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pycdlib-0:1.11.0-4.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch" }, "product_reference": "python3-pycdlib-0:1.11.0-4.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pynacl-0:1.3.0-6.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64" }, "product_reference": "python3-pynacl-0:1.3.0-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pynacl-0:1.3.0-6.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64" }, "product_reference": "python3-pynacl-0:1.3.0-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64" }, "product_reference": "python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64" }, "product_reference": "python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyparsing-0:2.3.1-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch" }, "product_reference": "python3-pyparsing-0:2.3.1-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyperclip-0:1.6.4-7.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch" }, "product_reference": "python3-pyperclip-0:1.6.4-7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyrsistent-0:0.16.0-4.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64" }, "product_reference": "python3-pyrsistent-0:0.16.0-4.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyrsistent-0:0.16.0-4.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64" }, "product_reference": "python3-pyrsistent-0:0.16.0-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64" }, "product_reference": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64" }, "product_reference": "python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-pysnmp-0:4.4.8-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch" }, "product_reference": "python3-pysnmp-0:4.4.8-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-redis-0:3.3.8-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch" }, "product_reference": "python3-redis-0:3.3.8-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-repoze-lru-0:0.7-7.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch" }, "product_reference": "python3-repoze-lru-0:0.7-7.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch" }, "product_reference": "python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-retrying-0:1.2.3-22.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch" }, "product_reference": "python3-retrying-0:1.2.3-22.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-rfc3986-0:1.2.0-6.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch" }, "product_reference": "python3-rfc3986-0:1.2.0-6.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-routes-0:2.4.1-12.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch" }, "product_reference": "python3-routes-0:2.4.1-12.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch" }, "product_reference": "python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-simplegeneric-0:0.8.1-18.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch" }, "product_reference": "python3-simplegeneric-0:0.8.1-18.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-simplejson-0:3.17.0-2.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64" }, "product_reference": "python3-simplejson-0:3.17.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-simplejson-0:3.17.0-2.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64" }, "product_reference": "python3-simplejson-0:3.17.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64" }, "product_reference": "python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64" }, "product_reference": "python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-singledispatch-0:3.4.0.3-19.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch" }, "product_reference": "python3-singledispatch-0:3.4.0.3-19.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-six-0:1.15.0-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch" }, "product_reference": "python3-six-0:1.15.0-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-soupsieve-0:2.1.0-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch" }, "product_reference": "python3-soupsieve-0:2.1.0-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sqlparse-0:0.2.4-10.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch" }, "product_reference": "python3-sqlparse-0:0.2.4-10.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-statsd-0:3.2.1-17.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch" }, "product_reference": "python3-statsd-0:3.2.1-17.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch" }, "product_reference": "python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch" }, "product_reference": "python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch" }, "product_reference": "python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch" }, "product_reference": "python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch" }, "product_reference": "python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch" }, "product_reference": "python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-tempita-0:0.5.1-25.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch" }, "product_reference": "python3-tempita-0:0.5.1-25.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-tenacity-0:6.2.0-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch" }, "product_reference": "python3-tenacity-0:6.2.0-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch" }, "product_reference": "python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-vine-0:1.3.0-5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch" }, "product_reference": "python3-vine-0:1.3.0-5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-voluptuous-0:0.11.7-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch" }, "product_reference": "python3-voluptuous-0:0.11.7-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-waitress-0:2.0.0-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch" }, "product_reference": "python3-waitress-0:2.0.0-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-warlock-0:1.3.3-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch" }, "product_reference": "python3-warlock-0:1.3.3-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-wcwidth-0:0.1.7-15.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch" }, "product_reference": "python3-wcwidth-0:0.1.7-15.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-webob-0:1.8.5-5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch" }, "product_reference": "python3-webob-0:1.8.5-5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-webtest-0:2.0.33-5.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch" }, "product_reference": "python3-webtest-0:2.0.33-5.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-werkzeug-0:2.0.3-1.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch" }, "product_reference": "python3-werkzeug-0:2.0.3-1.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-wrapt-0:1.11.2-4.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64" }, "product_reference": "python3-wrapt-0:1.11.2-4.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-wrapt-0:1.11.2-4.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64" }, "product_reference": "python3-wrapt-0:1.11.2-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64" }, "product_reference": "python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64" }, "product_reference": "python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch" }, "product_reference": "python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-yappi-0:1.0-3.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64" }, "product_reference": "python3-yappi-0:1.0-3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-yappi-0:1.0-3.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64" }, "product_reference": "python3-yappi-0:1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-yappi-debuginfo-0:1.0-3.el8.aarch64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64" }, "product_reference": "python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-yappi-debuginfo-0:1.0-3.el8.x86_64 as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64" }, "product_reference": "python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-zake-0:0.2.2-19.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch" }, "product_reference": "python3-zake-0:0.2.2-19.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-zeroconf-0:0.24.4-2.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch" }, "product_reference": "python3-zeroconf-0:0.24.4-2.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-zipp-0:0.5.1-3.el8.noarch as a component of Ironic content for Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" }, "product_reference": "python3-zipp-0:0.5.1-3.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-IRONIC-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-43565", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-12-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030787" } ], "notes": [ { "category": "description", "text": "There\u0027s an input validation flaw in golang.org/x/crypto\u0027s readCipherPacket() function. An unauthenticated attacker who sends an empty plaintext packet to a program linked with golang.org/x/crypto/ssh could cause a panic, potentially leading to denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang.org/x/crypto: empty plaintext packet causes panic", "title": "Vulnerability summary" }, { "category": "other", "text": "go-toolset shipped with Red Hat Developer Tools - Compilers and golang shipped with Red Hat Enterprise Linux 8 are not affected by this flaw because they do not ship the vulnerable code.\n\nThis flaw was rated to have a Moderate impact because it is not shipped in the Golang standard library and thus has a reduced impact to products compared with other flaws of this type.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43565" }, { "category": "external", "summary": "RHBZ#2030787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43565", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43565" } ], "release_date": "2021-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang.org/x/crypto: empty plaintext packet causes panic" }, { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1706", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2022-05-05T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082274" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Ignition, where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets.", "title": "Vulnerability description" }, { "category": "summary", "text": "ignition: configs are accessible from unprivileged containers in VMs running on VMware products", "title": "Vulnerability summary" }, { "category": "other", "text": "RHCOS may be less impacted than other distros since OCP\u0027s default Ignition config only contains a pointer to a config served by the Machine Config Server, and OCP prevents containers from accessing the MCS directly. So, the scope on RHCOS should be limited to any VMware users who manually modify the pointer config to include secrets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1706" }, { "category": "external", "summary": "RHBZ#2082274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1706", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1706" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1706", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1706" } ], "release_date": "2022-05-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" }, { "category": "workaround", "details": "Possible Workaround: It is not recommended to put secrets in the Ignition config.", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ignition: configs are accessible from unprivileged containers in VMs running on VMware products" }, { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" }, { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-29162", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "discovery_date": "2022-05-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2086398" } ], "notes": [ { "category": "description", "text": "A flaw was found in runc, where runc exec --cap executed processes with non-empty inheritable Linux process capabilities. This issue creates an atypical Linux environment and enables programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).", "title": "Vulnerability description" }, { "category": "summary", "text": "runc: incorrect handling of inheritable capabilities", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as low severity as the vulnerability can only result in atypical linux environment,and it\u0027s complex exploitation only results in minimal impact on system confidentiality, integrity, and availability in typical environments.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29162" }, { "category": "external", "summary": "RHBZ#2086398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086398" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29162", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29162" }, { "category": "external", "summary": "https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66", "url": "https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66" } ], "release_date": "2022-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-10T10:13:03+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5068" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:afterburn-debuginfo-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.src", "8Base-RHOSE-4.11:atomic-openshift-service-idler-0:4.11.0-202206222028.p0.g39cfc66.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:bootupd-debuginfo-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-2.el8.x86_64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:butane-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debuginfo-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:butane-debugsource-0:0.15.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:butane-redistributable-0:0.15.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-0:0.20.3-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:console-login-helper-messages-issuegen-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:console-login-helper-messages-profile-0:0.20.3-2.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:container-selinux-2:2.188.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-5.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:containers-common-2:1-21.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:coreos-installer-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-bootinfra-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debuginfo-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:coreos-installer-debugsource-0:0.15.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.1-11.rhaos4.11.gitb0d2ef3.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.src", "8Base-RHOSE-4.11:cri-tools-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debuginfo-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.aarch64", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.ppc64le", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.s390x", "8Base-RHOSE-4.11:cri-tools-debugsource-0:1.24.2-4.1.el8.x86_64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crit-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-debugsource-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-devel-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:criu-libs-debuginfo-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:crun-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debuginfo-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:crun-debugsource-0:1.4.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:fuse-overlayfs-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debuginfo-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:fuse-overlayfs-debugsource-0:1.9-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:haproxy-0:2.2.24-1.el8.src", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy-debugsource-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.aarch64", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.ppc64le", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.s390x", "8Base-RHOSE-4.11:haproxy22-debuginfo-0:2.2.24-1.el8.x86_64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:ignition-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-debugsource-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:ignition-validate-debuginfo-0:2.14.0-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.aarch64", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.ppc64le", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.src", "8Base-RHOSE-4.11:kata-containers-0:2.4.2-1.el8.x86_64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:libslirp-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debuginfo-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-debugsource-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:libslirp-devel-0:4.4.0-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:network-scripts-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202206240216.p0.g9de1722.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202207291716.p0.g7075089.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202207082037.p0.g9546431.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.src", "8Base-RHOSE-4.11:openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-debugsource-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-devel-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:openvswitch2.17-ipsec-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:openvswitch2.17-test-0:2.17.0-22.el8fdp.noarch", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.src", "8Base-RHOSE-4.11:ovn22.03-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-central-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-debugsource-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-host-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.03-vtep-debuginfo-0:22.03.0-37.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.src", "8Base-RHOSE-4.11:ovn22.06-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-central-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-debugsource-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-host-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.aarch64", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.ppc64le", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.s390x", "8Base-RHOSE-4.11:ovn22.06-vtep-debuginfo-0:22.06.0-27.el8fdp.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-6.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:python3-criu-0:3.15-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202206232036.p0.g66c0cec.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.aarch64", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.ppc64le", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.s390x", "8Base-RHOSE-4.11:python3-openvswitch2.17-debuginfo-0:2.17.0-22.el8fdp.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-afterburn-0:5.3.0-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:rust-afterburn-debugsource-0:5.3.0-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:rust-bootupd-0:0.2.5-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:rust-bootupd-debugsource-0:0.2.5-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.src", "8Base-RHOSE-4.11:slirp4netns-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debuginfo-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:slirp4netns-debugsource-0:1.1.8-1.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:toolbox-0:0.0.9-1.rhaos4.11.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.src", "8Base-RHOSE-IRONIC-4.11:libsodium-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debuginfo-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-debugsource-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-devel-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.ppc64le", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.s390x", "8Base-RHOSE-IRONIC-4.11:libsodium-static-0:1.0.16-5.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-1:20.2.1-0.20220628175043.b5ed57a.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-api-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-common-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-conductor-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-0:10.12.1-0.20220513095437.6dd37e5.el8.src", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-api-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-conductor-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-inspector-dnsmasq-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:openstack-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.src", "8Base-RHOSE-IRONIC-4.11:pycdlib-tools-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:pyparsing-0:2.3.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:pysnmp-0:4.4.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-SecretStorage-0:2.3.1-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-alembic-0:1.4.2-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-0:2.5.2-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-amqp-doc-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-appdirs-0:1.4.0-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-automaton-0:2.5.0-0.20220509195848.aaca110.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-0:3.1.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-bcrypt-debugsource-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-beautifulsoup4-0:4.9.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cachetools-0:3.1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.src", "8Base-RHOSE-IRONIC-4.11:python-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-colorama-0:0.4.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-construct-0:2.10.56-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dataclasses-0:0.8-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-decorator-0:4.4.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dogpile-cache-0:1.1.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.src", "8Base-RHOSE-IRONIC-4.11:python-editor-0:1.0.4-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-fasteners-0:0.14.1-21.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-1:1.1.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-flask-doc-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-funcsigs-0:1.0.2-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-futurist-0:2.4.1-0.20220509215250.159d752.el8.src", "8Base-RHOSE-IRONIC-4.11:python-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-0:0.4.14-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-greenlet-debugsource-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ifaddr-0:0.1.6-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-importlib-metadata-0:1.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.src", "8Base-RHOSE-IRONIC-4.11:python-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.src", "8Base-RHOSE-IRONIC-4.11:python-iso8601-0:0.1.12-9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonpath-rw-0:1.2.3-23.el8.src", "8Base-RHOSE-IRONIC-4.11:python-jsonschema-0:3.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kazoo-0:2.7.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keyring-0:21.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.src", "8Base-RHOSE-IRONIC-4.11:python-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.src", "8Base-RHOSE-IRONIC-4.11:python-kombu-1:4.6.6-8.el8.src", "8Base-RHOSE-IRONIC-4.11:python-logutils-0:0.3.5-7.1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-memcached-0:1.58-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-migrate-0:0.13.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-0:0.6.2-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-msgpack-debugsource-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-munch-0:2.3.2-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.src", "8Base-RHOSE-IRONIC-4.11:python-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-cache-lang-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-concurrency-lang-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-db-lang-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-i18n-lang-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-log-lang-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-middleware-lang-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-policy-lang-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-utils-lang-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-oslo-versionedobjects-lang-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-0:20.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-packaging-doc-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-paste-0:3.2.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-paste-deploy-0:2.0.1-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pbr-0:5.5.1-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pecan-0:1.3.2-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pexpect-0:4.6-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pint-0:0.10.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-prometheus_client-0:0.7.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-0:3.1.1-0.20220215232623.4179996.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pycadf-common-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pycdlib-0:1.11.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-0:1.3.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pynacl-debugsource-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-0:1.6.4-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyperclip-doc-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-0:0.16.0-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-pyrsistent-debugsource-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-redis-0:3.3.8-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-repoze-lru-0:0.7-7.el8.src", "8Base-RHOSE-IRONIC-4.11:python-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.src", "8Base-RHOSE-IRONIC-4.11:python-retrying-0:1.2.3-22.el8.src", "8Base-RHOSE-IRONIC-4.11:python-rfc3986-0:1.2.0-6.el8.src", "8Base-RHOSE-IRONIC-4.11:python-routes-0:2.4.1-12.el8.src", "8Base-RHOSE-IRONIC-4.11:python-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplegeneric-0:0.8.1-18.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-0:3.17.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-simplejson-debugsource-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-singledispatch-0:3.4.0.3-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-six-0:1.15.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-soupsieve-0:2.1.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sqlparse-0:0.2.4-10.el8.src", "8Base-RHOSE-IRONIC-4.11:python-statsd-0:3.2.1-17.el8.src", "8Base-RHOSE-IRONIC-4.11:python-stevedore-0:3.5.0-0.20220509195112.442f157.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-0:4.1.1-0.20220302175405.c769149.el8.src", "8Base-RHOSE-IRONIC-4.11:python-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.src", "8Base-RHOSE-IRONIC-4.11:python-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tempita-0:0.5.1-25.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tenacity-0:6.2.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.src", "8Base-RHOSE-IRONIC-4.11:python-vine-0:1.3.0-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-voluptuous-0:0.11.7-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-waitress-0:2.0.0-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-warlock-0:1.3.3-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wcwidth-0:0.1.7-15.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webob-0:1.8.5-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-webtest-0:2.0.33-5.el8.src", "8Base-RHOSE-IRONIC-4.11:python-werkzeug-0:2.0.3-1.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-0:1.11.2-4.el8.src", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-debugsource-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-wrapt-doc-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-wsme-0:0.11.0-0.20220216004816.80bda90.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-0:1.0-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python-yappi-debugsource-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python-zake-0:0.2.2-19.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zeroconf-0:0.24.4-2.el8.src", "8Base-RHOSE-IRONIC-4.11:python-zipp-0:0.5.1-3.el8.src", "8Base-RHOSE-IRONIC-4.11:python2-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-SecretStorage-0:2.3.1-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-alembic-0:1.4.2-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-amqp-0:2.5.2-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-appdirs-0:1.4.0-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-automaton-0:2.5.0-0.20220509195848.aaca110.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-bcrypt-debuginfo-0:3.1.6-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-beautifulsoup4-0:4.9.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cachetools-0:3.1.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cinderclient-0:8.3.0-0.20220509212734.ee59b68.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-cliff-tests-0:3.10.1-0.20220509200732.a04a48f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-colorama-0:0.4.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-construct-0:2.10.56-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dataclasses-0:0.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-debtcollector-0:2.5.0-0.20220509211533.a6b46c5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-decorator-0:4.4.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dogpile-cache-0:1.1.2-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-dracclient-0:8.0.0-0.20220509201613.9c7499c.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-editor-0:1.0.4-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-fasteners-0:0.14.1-21.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-flask-1:1.1.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-funcsigs-0:1.0.2-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-futurist-0:2.4.1-0.20220509215250.159d752.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-glanceclient-1:3.6.0-0.20220509212414.626c500.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-debuginfo-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-greenlet-devel-0:0.4.14-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-hardware-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-hardware-detect-0:0.29.0-0.20220216015636.7662a1d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ifaddr-0:0.1.6-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-importlib-metadata-0:1.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-inspector-tests-0:10.12.1-0.20220513095437.6dd37e5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-lib-0:5.1.1-0.20220225151335.e205816.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-prometheus-exporter-0:3.1.1-0.20220324125409.db1a824.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-python-agent-0:8.6.1-0.20220623075054.1d50c23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-ironic-tests-1:20.2.1-0.20220628175043.b5ed57a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-iso8601-0:0.1.12-9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonpath-rw-0:1.2.3-23.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-jsonschema-0:3.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kazoo-0:2.7.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keyring-0:21.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneauth1-0:4.5.0-0.20220509213157.8da0a63.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystoneclient-tests-1:4.4.0-0.20220509200759.100253d.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-keystonemiddleware-0:9.4.0-0.20220509211054.8a05709.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-kombu-1:4.6.6-8.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-logutils-0:0.3.5-7.1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-memcached-0:1.58-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-migrate-0:0.13.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-msgpack-debuginfo-0:0.6.2-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-munch-0:2.3.2-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-openstacksdk-tests-0:0.61.0-0.20220509201549.26c9bc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-service-types-0:1.7.0-0.20220215231659.0b2f473.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-os-traits-tests-0:2.7.0-0.20220509205801.3d1dbf0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osc-lib-tests-0:2.5.0-0.20220509211843.78d276e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-cache-tests-0:2.8.1-0.20220216000746.40946a9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-concurrency-tests-0:4.5.1-0.20220509221157.145f060.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-config-2:8.8.0-0.20220509202553.64c82a0.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-context-tests-0:4.1.0-0.20220509205437.3400cc2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-db-tests-0:9.1.0-0.20220216003829.be2cc6a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-i18n-0:5.1.0-0.20220216011159.b031d17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-log-tests-0:4.6.0-0.20220216002407.41c8807.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-messaging-tests-0:12.13.0-0.20220509210748.2d090b5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-metrics-tests-0:0.3.0-0.20220216012738.43eee50.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-middleware-tests-0:4.5.1-0.20220509203328.2f72b30.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-policy-tests-0:3.12.1-0.20220509221328.9673a74.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-rootwrap-tests-0:6.3.1-0.20220509204453.1b1b960.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-serialization-tests-0:4.3.0-0.20220509195921.6910f75.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-service-tests-0:2.8.0-0.20220509203713.6552b9a.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-upgradecheck-0:1.5.0-0.20220509195112.1559e03.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-utils-tests-0:4.13.0-0.20220509213520.de4429f.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-oslo-versionedobjects-tests-0:2.6.0-0.20220509202736.25d34d6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-osprofiler-0:3.4.3-0.20220509214403.3286301.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-packaging-0:20.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-0:3.2.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-paste-deploy-0:2.0.1-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pbr-0:5.5.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pecan-0:1.3.2-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pexpect-0:4.6-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pint-0:0.10.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-proliantutils-0:2.13.2-0.20220509214147.8c7b6b1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-prometheus_client-0:0.7.1-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycadf-0:3.1.1-0.20220215232623.4179996.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pycdlib-0:1.11.0-4.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pynacl-debuginfo-0:1.3.0-6.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyparsing-0:2.3.1-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyperclip-0:1.6.4-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-pyrsistent-debuginfo-0:0.16.0-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-pysnmp-0:4.4.8-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-redis-0:3.3.8-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-repoze-lru-0:0.7-7.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-requestsexceptions-0:1.4.0-0.20220215231659.d7ac0ff.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-retrying-0:1.2.3-22.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-rfc3986-0:1.2.0-6.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-routes-0:2.4.1-12.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-scciclient-0:0.11.1-0.20220216020832.a84332b.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplegeneric-0:0.8.1-18.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-simplejson-debuginfo-0:3.17.0-2.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-singledispatch-0:3.4.0.3-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-six-0:1.15.0-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-soupsieve-0:2.1.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sqlparse-0:0.2.4-10.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-statsd-0:3.2.1-17.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-stevedore-0:3.5.0-0.20220509195112.442f157.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-oem-idrac-tests-0:4.0.0-0.20220324125409.7b75e6e.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-sushy-tests-0:4.1.1-0.20220302175405.c769149.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-swiftclient-0:3.13.1-0.20220509204112.4989d94.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tempita-0:0.5.1-25.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tenacity-0:6.2.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-tooz-0:2.11.1-0.20220509215238.96f91b9.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-vine-0:1.3.0-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-voluptuous-0:0.11.7-3.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-waitress-0:2.0.0-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-warlock-0:1.3.3-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wcwidth-0:0.1.7-15.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webob-0:1.8.5-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-webtest-0:2.0.33-5.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-werkzeug-0:2.0.3-1.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-wrapt-debuginfo-0:1.11.2-4.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-wsme-0:0.11.0-0.20220216004816.80bda90.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.aarch64", "8Base-RHOSE-IRONIC-4.11:python3-yappi-debuginfo-0:1.0-3.el8.x86_64", "8Base-RHOSE-IRONIC-4.11:python3-zake-0:0.2.2-19.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zeroconf-0:0.24.4-2.el8.noarch", "8Base-RHOSE-IRONIC-4.11:python3-zipp-0:0.5.1-3.el8.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "runc: incorrect handling of inheritable capabilities" } ] }
rhsa-2022_6155
Vulnerability from csaf_redhat
Published
2022-08-24 13:43
Modified
2024-12-17 22:01
Summary
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement & bugfix update
Notes
Topic
Updated packages that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Data Foundation is software-defined storage integrated
with and optimized for the Red Hat OpenShift Container Platform. Red Hat
OpenShift Data Foundation is a highly scalable, production-grade persistent
storage for stateful applications running in the Red Hat OpenShift
Container Platform. In addition to persistent storage, Red Hat OpenShift
Data Foundation provisions a multicloud data management service with an S3
compatible API.
Security Fix(es):
* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
These updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:
https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index
All Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.11.0 on Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Data Foundation is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Data Foundation is a highly scalable, production-grade persistent\nstorage for stateful applications running in the Red Hat OpenShift\nContainer Platform. In addition to persistent storage, Red Hat OpenShift\nData Foundation provisions a multicloud data management service with an S3\ncompatible API.\n\nSecurity Fix(es):\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these updated packages, which provide numerous bug fixes and enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6155", "url": "https://access.redhat.com/errata/RHSA-2022:6155" }, { "category": "external", "summary": "https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index", "url": "https://access.redhat.com//documentation/en-us/red_hat_openshift_data_foundation/4.11/html/4.11_release_notes/index" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2027849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027849" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6155.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement \u0026 bugfix update", "tracking": { "current_release_date": "2024-12-17T22:01:21+00:00", "generator": { "date": "2024-12-17T22:01:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6155", "initial_release_date": "2022-08-24T13:43:53+00:00", "revision_history": [ { "date": "2022-08-24T13:43:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-24T13:43:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:01:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHODF 4.11 for RHEL 8", "product": { "name": "RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_data_foundation:4.11::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Data Foundation" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.11.0-22.el8.src", "product": { "name": "mcg-0:5.11.0-22.el8.src", "product_id": "mcg-0:5.11.0-22.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.11.0-22.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.11.0-22.el8.x86_64", "product": { "name": "mcg-0:5.11.0-22.el8.x86_64", "product_id": "mcg-0:5.11.0-22.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.11.0-22.el8?arch=x86_64" } } }, { "category": "product_version", "name": "mcg-redistributable-0:5.11.0-22.el8.x86_64", "product": { "name": "mcg-redistributable-0:5.11.0-22.el8.x86_64", "product_id": "mcg-redistributable-0:5.11.0-22.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg-redistributable@5.11.0-22.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.11.0-22.el8.ppc64le", "product": { "name": "mcg-0:5.11.0-22.el8.ppc64le", "product_id": "mcg-0:5.11.0-22.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.11.0-22.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mcg-0:5.11.0-22.el8.s390x", "product": { "name": "mcg-0:5.11.0-22.el8.s390x", "product_id": "mcg-0:5.11.0-22.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mcg@5.11.0-22.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.11.0-22.el8.ppc64le as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le" }, "product_reference": "mcg-0:5.11.0-22.el8.ppc64le", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.11.0-22.el8.s390x as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x" }, "product_reference": "mcg-0:5.11.0-22.el8.s390x", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.11.0-22.el8.src as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src" }, "product_reference": "mcg-0:5.11.0-22.el8.src", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-0:5.11.0-22.el8.x86_64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64" }, "product_reference": "mcg-0:5.11.0-22.el8.x86_64", "relates_to_product_reference": "8Base-RHODF-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "mcg-redistributable-0:5.11.0-22.el8.x86_64 as a component of RHODF 4.11 for RHEL 8", "product_id": "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" }, "product_reference": "mcg-redistributable-0:5.11.0-22.el8.x86_64", "relates_to_product_reference": "8Base-RHODF-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:43:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6155" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:43:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6155" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-24T13:43:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6155" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.ppc64le", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.s390x", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.src", "8Base-RHODF-4.11:mcg-0:5.11.0-22.el8.x86_64", "8Base-RHODF-4.11:mcg-redistributable-0:5.11.0-22.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" } ] }
rhsa-2022_6152
Vulnerability from csaf_redhat
Published
2022-09-01 05:40
Modified
2024-12-17 22:01
Summary
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update
Notes
Topic
Secondary Scheduler Operator for Red Hat OpenShift 1.1.0
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Details
Secondary Scheduler Operator for Red Hat OpenShift 1.1.0
Security Fix(es):
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Secondary Scheduler Operator for Red Hat OpenShift 1.1.0\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a\ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Secondary Scheduler Operator for Red Hat OpenShift 1.1.0\n\nSecurity Fix(es):\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n* golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n* golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\n* golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\n* golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s)\nlisted in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6152", "url": "https://access.redhat.com/errata/RHSA-2022:6152" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2105001", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2105001" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "WRKLDS-466", "url": "https://issues.redhat.com/browse/WRKLDS-466" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6152.json" } ], "title": "Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.0 security update", "tracking": { "current_release_date": "2024-12-17T22:01:12+00:00", "generator": { "date": "2024-12-17T22:01:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6152", "initial_release_date": "2022-09-01T05:40:28+00:00", "revision_history": [ { "date": "2022-09-01T05:40:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-01T05:40:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:01:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OSSO 1.1 for RHEL 8", "product": { "name": "OSSO 1.1 for RHEL 8", "product_id": "8Base-OSSO-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_secondary_scheduler:1.1::el8" } } } ], "category": "product_family", "name": "Openshift Secondary Scheduler Operator" }, { "branches": [ { "category": "product_version", "name": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "product": { "name": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "product_id": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "product_identification_helper": { "purl": "pkg:oci/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle\u0026tag=v1.1-11" } } }, { "category": "product_version", "name": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64", "product": { "name": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64", "product_id": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64", "product_identification_helper": { "purl": "pkg:oci/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69?arch=amd64\u0026repository_url=registry.redhat.io/openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8\u0026tag=v1.1-11" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64 as a component of OSSO 1.1 for RHEL 8", "product_id": "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" }, "product_reference": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "relates_to_product_reference": "8Base-OSSO-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64 as a component of OSSO 1.1 for RHEL 8", "product_id": "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" }, "product_reference": "openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64", "relates_to_product_reference": "8Base-OSSO-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "known_not_affected": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T05:40:28+00:00", "details": "For Secondary Scheduler Operator 1.1.0 see the following documentation, which\nwill be updated shortly, for detailed release notes:\n\nFor more information on Secondary Scheduler Operator for Red Hat OpenShift\n1.1.0, see the following release notes:\n\nhttps://docs.openshift.com/container-platform/4.11/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html#secondary-scheduler-operator-release-notes-1.1.0", "product_ids": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-bundle@sha256:752fb4e99e8d8dee18579aba58f34d5248822e77590a51c0d72ecbc726c90a4e_amd64", "8Base-OSSO-1.1:openshift-secondary-scheduler-operator/secondary-scheduler-operator-rhel8@sha256:777bb9e4d92ca645fb10cb85d3d0bbc35408e63d0dbddee200a85a018b6afc69_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" } ] }
rhsa-2022_5875
Vulnerability from csaf_redhat
Published
2022-08-09 02:34
Modified
2024-12-17 21:59
Summary
Red Hat Security Advisory: OpenShift Container Platform 4.10.26 security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.10.26 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.10.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.26. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHBA-2022:5874
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html
Security Fix(es):
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: cmd/go: misinterpretation of branch names can lead to incorrect
access control (CVE-2022-23773)
* golang: crypto/elliptic IsOnCurve returns true for invalid field elements
(CVE-2022-23806)
* golang: crypto/elliptic: panic caused by oversized scalar
(CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.26-x86_64
The image digest is sha256:e1fa1f513068082d97d78be643c369398b0e6820afab708d26acda2262940954
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.26-s390x
The image digest is sha256:a60c4f3aeefa47d7ddd25041eccc6e1a05c6a0b3a26317903da0d97cd6836f41
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.26-ppc64le
The image digest is sha256:aeccc9442e88f82c448c0bba1f6f1927574c684cab2890cf675ee34c862bb864
All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available
at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.10.26 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.10.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.10.26. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/RHBA-2022:5874\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nSecurity Fix(es):\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect\naccess control (CVE-2022-23773)\n* golang: crypto/elliptic IsOnCurve returns true for invalid field elements\n(CVE-2022-23806)\n* golang: crypto/elliptic: panic caused by oversized scalar\n(CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nYou may download the oc tool and use it to inspect release image metadata as follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.26-x86_64\n\nThe image digest is sha256:e1fa1f513068082d97d78be643c369398b0e6820afab708d26acda2262940954\n\n(For s390x architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.26-s390x\n\nThe image digest is sha256:a60c4f3aeefa47d7ddd25041eccc6e1a05c6a0b3a26317903da0d97cd6836f41\n\n(For ppc64le architecture)\n\n $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.10.26-ppc64le\n\nThe image digest is sha256:aeccc9442e88f82c448c0bba1f6f1927574c684cab2890cf675ee34c862bb864\n\nAll OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available\nat https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5875", "url": "https://access.redhat.com/errata/RHSA-2022:5875" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1921656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921656" }, { "category": "external", "summary": "2052444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052444" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "2053703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053703" }, { "category": "external", "summary": "2063153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063153" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2086451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086451" }, { "category": "external", "summary": "2100103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100103" }, { "category": "external", "summary": "2106158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106158" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107495" }, { "category": "external", "summary": "2107678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107678" }, { "category": "external", "summary": "2108193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2108193" }, { "category": "external", "summary": "2109124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109124" }, { "category": "external", "summary": "2110536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110536" }, { "category": "external", "summary": "2110765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110765" }, { "category": "external", "summary": "2110938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110938" }, { "category": "external", "summary": "2112910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112910" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5875.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.10.26 security update", "tracking": { "current_release_date": "2024-12-17T21:59:36+00:00", "generator": { "date": "2024-12-17T21:59:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:5875", "initial_release_date": "2022-08-09T02:34:48+00:00", "revision_history": [ { "date": "2022-08-09T02:34:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-08-09T02:34:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T21:59:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.10", "product": { "name": "Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.10::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "product_id": "openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.10.0-202207301627.p0.g012b960.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g0716ee4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.ga918723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.10.0-202207291908.p0.g1ec9353.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "product_id": "openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.10.0-202207291908.p0.g837ad53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.10.0-202208011505.p0.g73f9609.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "product_id": "openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.10.0-202207291908.p0.g288bd4d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "product": { "name": "openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "product_id": "openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.10.0-202207291908.p0.g22a40ce.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "product": { "name": "openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "product_id": "openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.10.0-202207291908.p0.g3ec1ee7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "product_id": "openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "product_id": "openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "product_id": "openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "product": { "name": "openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "product_id": "openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.10.0-202207291908.p0.g799d414.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.10.0-202207291908.p0.g0133959.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.10.0-202207291908.p0.g0eed310.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "product": { "name": "openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "product_id": "openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.10.0-202207291908.p0.g3c6cd55.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "product": { "name": "openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "product_id": "openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.10.0-202207291908.p0.g48aec35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "product": { "name": "openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "product_id": "openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.10.0-202207291908.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.10.0-202207291908.p0.g4f198b2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "product_id": "openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.10.0-202207291908.p0.g088ab06.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "product": { "name": "openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "product_id": "openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.10.0-202207291908.p0.g80b92ec.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "product": { "name": "openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "product_id": "openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.10.0-202207291908.p0.g5059ec2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.10.0-202207291908.p0.g245b95f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "product": { "name": "openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "product_id": "openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.10.0-202207291908.p0.g24d8db4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "product": { "name": "openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "product_id": "openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "product": { "name": "openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "product_id": "openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.10.0-202208021356.p0.gdee1944.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "product": { "name": "openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "product_id": "openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.10.0-202207291908.p0.g7e488d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "product": { "name": "openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "product_id": "openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "product": { "name": "openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "product_id": "openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.10.0-202207291908.p0.g11109e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "product": { "name": "openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "product_id": "openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "product": { "name": "openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "product_id": "openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "product": { "name": "openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "product_id": "openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.10.0-202207291908.p0.g534ab3a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "product": { "name": "openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "product_id": "openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.10.0-202207291908.p0.g4e11d23.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "product": { "name": "openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "product_id": "openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.10.0-202207291908.p0.ge5c50aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "product": { "name": "openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "product_id": "openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g20e2b86.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.10.0-202207291908.p0.g40c11f7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "product": { "name": "openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "product_id": "openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "product_id": "openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.10.0-202207291908.p0.gef868a8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "product": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "product_id": "openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "product_identification_helper": { "purl": "pkg:oci/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/cloud-network-config-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8723adb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.10.0-202207291908.p0.g6a015c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.10.0-202207291908.p0.g8bcdccc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.gc6584b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "product_id": "openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.10.0-202207291908.p0.gf22d1c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.ge2e0d4f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "product_id": "openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.10.0-202207291908.p0.g0840c6f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gace1862.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "product_id": "openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.10.0-202207291908.p0.gbc48e0a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.10.0-202207291908.p0.gd2df5e8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.10.0-202207301627.p0.g5001c08.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g696981d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gca3ff53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.10.0-202207291908.p0.gd8694a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g7e1f568.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "product_id": "openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.10.0-202207291908.p0.g95404c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g853d84f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gb8b65d1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g573ac47.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8e5b365.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "product_id": "openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.10.0-202207291908.p0.gd41950d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "product_id": "openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.10.0-202207291908.p0.ge9e211d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.10.0-202207291908.p0.g3123ef8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "product": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "product_id": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-rhel8\u0026tag=v4.10.0-202207291908.p0.gd06ff18.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "product": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "product_id": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g662615b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "product_id": "openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "product_id": "openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5c56bc8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "product": { "name": "openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "product_id": "openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.10.0-202208020345.p0.g7afa17c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "product": { "name": "openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "product_id": "openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.10.0-202207301627.p0.gd78564a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g85bb6ef.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "product": { "name": "openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "product_id": "openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "product": { "name": "openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "product_id": "openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "product_id": "openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.10.0-202207291908.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g3b330b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "product": { "name": "openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "product_id": "openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.10.0-202207291908.p0.gca4a4c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "product": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "product_id": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-openstack-rhel8\u0026tag=v4.10.0-202207291908.p0.g2401f74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "product": { "name": "openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "product_id": "openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.10.0-202207291908.p0.gdc29945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "product_id": "openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.10.0-202207291908.p0.gd7a7fe5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.10.0-202207291908.p0.gbfcc6c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.ga8d68d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "product": { "name": "openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "product_id": "openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.10.0-202207291908.p0.gdb7f815.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "product": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "product_id": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-network-interface-bond-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5ccc626.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.10.0-202207291908.p0.g234c138.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "product": { "name": "openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "product_id": "openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.10.0-202208012036.p0.gbcfec9c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "product_id": "openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.10.0-202208011505.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.geffa26a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.g5eabbaa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g2c2d50d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gcb58fe4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.10.0-202208012326.p0.gf6b5171.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "product": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "product_id": "openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel7\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.g35ce9aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "product_id": "openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.10.0-202208012036.p0.g464b78d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.10.0-202207291908.p0.g4052b31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "product": { "name": "openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "product_id": "openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.10.0-202207291908.p0.g1611373.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "product_id": "openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.10.0-202207291908.p0.g10ca1d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "product": { "name": "openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "product_id": "openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "product": { "name": "openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "product_id": "openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "product_id": "openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.10.0-202207291908.p0.g5f4c899.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "product": { "name": "openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "product_id": "openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61?arch=s390x\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.10.0-202207291908.p0.g2c9c76e.assembly.stream" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "product_id": "openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.10.0-202207301627.p0.g012b960.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g0716ee4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.ga918723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.10.0-202207291908.p0.g1ec9353.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "product_id": "openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.10.0-202207291908.p0.g837ad53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.10.0-202208011505.p0.g73f9609.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "product_id": "openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.10.0-202207291908.p0.g288bd4d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "product": { "name": "openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "product_id": "openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.10.0-202207291908.p0.g22a40ce.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "product": { "name": "openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "product_id": "openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.10.0-202207291908.p0.g3ec1ee7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "product_id": "openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.ga0942c0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.10.0-202207291908.p0.g3448830.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "product_id": "openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "product_id": "openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "product": { "name": "openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "product_id": "openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.10.0-202207291908.p0.g799d414.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.10.0-202207291908.p0.g0133959.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.10.0-202207291908.p0.g0eed310.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "product": { "name": "openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "product_id": "openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.10.0-202207291908.p0.g3c6cd55.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "product": { "name": "openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "product_id": "openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.10.0-202207291908.p0.g48aec35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "product": { "name": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "product_id": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-vpc-node-label-updater-rhel8\u0026tag=v4.10.0-202207291908.p0.g7074dfc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "product": { "name": "openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "product_id": "openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.10.0-202207291908.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.10.0-202207291908.p0.g4f198b2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "product_id": "openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.10.0-202207291908.p0.g088ab06.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "product": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.10.0-202208011505.p0.ge96efa4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "product": { "name": "openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "product_id": "openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel8\u0026tag=v4.10.0-202208011505.p0.ge96efa4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "product": { "name": "openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "product_id": "openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.10.0-202207291908.p0.g80b92ec.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "product": { "name": "openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "product_id": "openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.10.0-202207291908.p0.g5059ec2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.10.0-202207291908.p0.g245b95f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "product": { "name": "openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "product_id": "openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.10.0-202207291908.p0.g24d8db4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "product": { "name": "openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "product_id": "openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "product": { "name": "openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "product_id": "openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.10.0-202208021356.p0.gdee1944.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "product": { "name": "openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "product_id": "openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.10.0-202207291908.p0.g7e488d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "product": { "name": "openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "product_id": "openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "product": { "name": "openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "product_id": "openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.10.0-202207291908.p0.g11109e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "product": { "name": "openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "product_id": "openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "product": { "name": "openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "product_id": "openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "product": { "name": "openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "product_id": "openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.10.0-202207291908.p0.g534ab3a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "product": { "name": "openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "product_id": "openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.10.0-202207291908.p0.g4e11d23.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "product": { "name": "openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "product_id": "openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.10.0-202207291908.p0.ge5c50aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "product": { "name": "openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "product_id": "openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g20e2b86.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.10.0-202207291908.p0.g40c11f7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "product": { "name": "openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "product_id": "openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "product_id": "openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.10.0-202207291908.p0.gef868a8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "product": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "product_id": "openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/cloud-network-config-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8723adb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.10.0-202207291908.p0.g6a015c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.10.0-202207291908.p0.g8bcdccc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.gc6584b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "product_id": "openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.10.0-202207291908.p0.gf22d1c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.ge2e0d4f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "product_id": "openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.10.0-202207291908.p0.g0840c6f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gace1862.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "product_id": "openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.10.0-202207291908.p0.gbc48e0a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.10.0-202207291908.p0.gd2df5e8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.10.0-202207301627.p0.g5001c08.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g696981d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gca3ff53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.10.0-202207291908.p0.gd8694a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g7e1f568.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "product_id": "openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.10.0-202207291908.p0.g95404c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g853d84f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gb8b65d1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g573ac47.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8e5b365.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "product_id": "openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.10.0-202207291908.p0.gd41950d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "product_id": "openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.10.0-202207291908.p0.ge9e211d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.10.0-202207291908.p0.g3123ef8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "product": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "product_id": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-rhel8\u0026tag=v4.10.0-202207291908.p0.gd06ff18.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "product": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "product_id": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g662615b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "product_id": "openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "product_id": "openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5c56bc8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "product": { "name": "openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "product_id": "openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.10.0-202208020345.p0.g7afa17c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "product": { "name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "product_id": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g4dc728d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g19e9a57.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g0e369de.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "product": { "name": "openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "product_id": "openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.10.0-202207301627.p0.gd78564a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "product": { "name": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "product_id": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.ge303912.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "product": { "name": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "product_id": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ibmcloud-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.g7449a94.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "product": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "product_id": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.gd54e370.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "product": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "product_id": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g28bad53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g85bb6ef.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "product": { "name": "openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "product_id": "openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "product": { "name": "openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "product_id": "openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "product_id": "openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.10.0-202207291908.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g3b330b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "product": { "name": "openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "product_id": "openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.10.0-202207291908.p0.gca4a4c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "product": { "name": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "product_id": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-gcp-rhel8\u0026tag=v4.10.0-202207291908.p0.g3fe46c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "product": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "product_id": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-openstack-rhel8\u0026tag=v4.10.0-202207291908.p0.g2401f74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "product": { "name": "openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "product_id": "openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.10.0-202207291908.p0.gdc29945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "product_id": "openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.10.0-202207291908.p0.gd7a7fe5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.10.0-202207291908.p0.gbfcc6c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.ga8d68d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "product": { "name": "openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "product_id": "openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.10.0-202207291908.p0.gdb7f815.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "product": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "product_id": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-network-interface-bond-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5ccc626.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.10.0-202207291908.p0.g234c138.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "product": { "name": "openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "product_id": "openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.10.0-202208012036.p0.gbcfec9c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "product_id": "openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.10.0-202208011505.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.geffa26a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.g5eabbaa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g2c2d50d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gcb58fe4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.10.0-202208012326.p0.gf6b5171.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "product": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "product_id": "openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel7\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.g35ce9aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "product_id": "openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.10.0-202208012036.p0.g464b78d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "product": { "name": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "product_id": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-powervs-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.gc1d68e7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.10.0-202207291908.p0.g4052b31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "product": { "name": "openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "product_id": "openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.10.0-202207291908.p0.g1611373.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "product_id": "openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.10.0-202207291908.p0.g10ca1d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "product": { "name": "openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "product_id": "openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "product": { "name": "openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "product_id": "openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "product_id": "openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.10.0-202207291908.p0.g5f4c899.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "product": { "name": "openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "product_id": "openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.10.0-202207291908.p0.g2c9c76e.assembly.stream" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.10.0-202207301627.p0.g012b960.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g0716ee4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.ga918723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.10.0-202207291908.p0.g1ec9353.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "product_id": "openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.10.0-202207291908.p0.g837ad53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.10.0-202208011505.p0.g73f9609.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "product_id": "openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.10.0-202207291908.p0.g288bd4d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "product_id": "openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.10.0-202207291908.p0.g22a40ce.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "product": { "name": "openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "product_id": "openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.10.0-202207291908.p0.g3ec1ee7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "product_id": "openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "product_id": "openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "product": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "product_id": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-manila-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.ga0942c0.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "product": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "product_id": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-nfs-rhel8\u0026tag=v4.10.0-202207291908.p0.g3448830.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "product_id": "openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "product_id": "openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "product_id": "openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.10.0-202207291908.p0.g799d414.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.10.0-202207291908.p0.g0133959.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.10.0-202207291908.p0.g0eed310.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "product": { "name": "openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "product_id": "openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.10.0-202207291908.p0.g3c6cd55.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "product": { "name": "openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "product_id": "openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.10.0-202207291908.p0.g48aec35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "product": { "name": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "product_id": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-vpc-node-label-updater-rhel8\u0026tag=v4.10.0-202207291908.p0.g7074dfc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "product": { "name": "openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "product_id": "openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-rhel8\u0026tag=v4.10.0-202208011125.p0.g62012c2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "product": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "product_id": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ironic-machine-os-downloader-rhel8\u0026tag=v4.10.0-202207291908.p0.g81fe297.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "product": { "name": "openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "product_id": "openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.10.0-202207291908.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.10.0-202207291908.p0.g4f198b2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "product_id": "openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.10.0-202207291908.p0.g088ab06.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "product": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "product_id": "openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-cni-rhel8\u0026tag=v4.10.0-202208011505.p0.ge96efa4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "product": { "name": "openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "product_id": "openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kuryr-controller-rhel8\u0026tag=v4.10.0-202208011505.p0.ge96efa4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "product_id": "openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.10.0-202207291908.p0.g80b92ec.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "product": { "name": "openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "product_id": "openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.10.0-202207291908.p0.g5059ec2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.10.0-202207291908.p0.g245b95f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "product": { "name": "openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "product_id": "openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "product_identification_helper": { "purl": "pkg:oci/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/oc-mirror-plugin-rhel8\u0026tag=v4.10.0-202207291908.p0.g71ca0a1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "product": { "name": "openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "product_id": "openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.10.0-202207291908.p0.g24d8db4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "product": { "name": "openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "product_id": "openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-alt-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "product": { "name": "openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "product_id": "openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "product": { "name": "openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "product_id": "openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.10.0-202208021356.p0.gdee1944.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "product": { "name": "openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "product_id": "openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.10.0-202207291908.p0.g7e488d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "product": { "name": "openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "product_id": "openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "product": { "name": "openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "product_id": "openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.10.0-202207291908.p0.g11109e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "product": { "name": "openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "product_id": "openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "product": { "name": "openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "product_id": "openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "product": { "name": "openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "product_id": "openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.10.0-202207291908.p0.g534ab3a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "product": { "name": "openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "product_id": "openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.10.0-202207291908.p0.g4e11d23.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "product": { "name": "openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "product_id": "openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.10.0-202207291908.p0.ge5c50aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "product": { "name": "openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "product_id": "openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "product": { "name": "openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "product_id": "openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-alibaba-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.gdb2d118.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "product": { "name": "openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "product_id": "openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-alibaba-cloud-csi-driver-container-rhel8\u0026tag=v4.10.0-202207291908.p0.g3ddbb2b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "product": { "name": "openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "product_id": "openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8\u0026tag=v4.10.0-202207291908.p0.gf0d6966.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "product": { "name": "openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "product_id": "openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-alibaba-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.g0206121.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "product": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.gd85867f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g8ba0c7a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gc2e6dc1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.10.0-202207291908.p0.g7f9eb87.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "product": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "product_id": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g07f1335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "product": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "product_id": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-cloud-node-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g07f1335.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g3d79d39.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "product": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "product_id": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-disk-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g8f980cc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "product": { "name": "openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "product_id": "openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-file-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.gf88155b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "product": { "name": "openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "product_id": "openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-azure-file-csi-driver-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g3807eb3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g20e2b86.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.10.0-202207291908.p0.g40c11f7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "product": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "product_id": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts-alt-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "product_id": "openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.10.0-202207291908.p0.gef868a8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "product": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "product_id": "openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "product_identification_helper": { "purl": "pkg:oci/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/cloud-network-config-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8723adb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.10.0-202207291908.p0.g6a015c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.10.0-202207291908.p0.g8bcdccc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.gc6584b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.10.0-202207291908.p0.gf22d1c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.ge2e0d4f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "product_id": "openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.10.0-202207291908.p0.g0840c6f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gace1862.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.10.0-202207291908.p0.gbc48e0a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.10.0-202207291908.p0.gd2df5e8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.10.0-202207301627.p0.g5001c08.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g696981d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gca3ff53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.10.0-202207291908.p0.gd8694a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g7e1f568.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.10.0-202207291908.p0.g95404c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g853d84f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gb8b65d1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g573ac47.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8e5b365.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.10.0-202207291908.p0.gd41950d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.10.0-202207291908.p0.ge9e211d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.10.0-202207291908.p0.g3123ef8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "product_id": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-rhel8\u0026tag=v4.10.0-202207291908.p0.gd06ff18.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "product_id": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g662615b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "product_id": "openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "product_id": "openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5c56bc8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "product": { "name": "openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "product_id": "openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.10.0-202208020345.p0.g7afa17c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "product": { "name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "product_id": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g4dc728d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "product_id": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g19e9a57.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "product": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "product_id": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-gcp-pd-csi-driver-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g0e369de.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "product": { "name": "openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "product_id": "openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.10.0-202207301627.p0.gd78564a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "product": { "name": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "product_id": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.ge303912.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "product": { "name": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "product_id": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ibmcloud-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.g7449a94.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "product": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "product_id": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.gd54e370.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "product": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "product_id": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g28bad53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "product": { "name": "openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "product_id": "openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-image-customization-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g44d63f1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g85bb6ef.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "product_id": "openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "product": { "name": "openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "product_id": "openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.10.0-202207291908.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g3b330b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "product_id": "openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.10.0-202207291908.p0.gca4a4c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "product": { "name": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "product_id": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-aws-rhel8\u0026tag=v4.10.0-202207291908.p0.g518b028.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "product": { "name": "openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "product_id": "openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-azure-rhel8\u0026tag=v4.10.0-202207291908.p0.g0b2bf99.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "product": { "name": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "product_id": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-gcp-rhel8\u0026tag=v4.10.0-202207291908.p0.g3fe46c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "product": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "product_id": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-openstack-rhel8\u0026tag=v4.10.0-202207291908.p0.g2401f74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "product_id": "openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.10.0-202207291908.p0.gdc29945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "product": { "name": "openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "product_id": "openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-os-images-rhel8\u0026tag=v4.10.0-202207291908.p0.g5211875.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "product_id": "openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.10.0-202207291908.p0.gd7a7fe5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.10.0-202207291908.p0.gbfcc6c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.ga8d68d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "product": { "name": "openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "product_id": "openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.10.0-202207291908.p0.gdb7f815.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "product": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "product_id": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-network-interface-bond-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5ccc626.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.10.0-202207291908.p0.g234c138.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "product": { "name": "openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "product_id": "openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.10.0-202208012036.p0.gbcfec9c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "product_id": "openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.10.0-202208011505.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.geffa26a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.g5eabbaa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g2c2d50d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gcb58fe4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.10.0-202208012326.p0.gf6b5171.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "product": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "product_id": "openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel7\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.g35ce9aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.10.0-202208012036.p0.g464b78d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "product": { "name": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "product_id": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-powervs-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.gc1d68e7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.10.0-202207291908.p0.g4052b31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "product_id": "openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.10.0-202207291908.p0.g1611373.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "product_id": "openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.10.0-202207291908.p0.g10ca1d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "product": { "name": "openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "product_id": "openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.ge310f4d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "product": { "name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "product_id": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.ge310f4d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "product": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "product_id": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g7401726.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "product": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "product_id": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g7401726.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "product": { "name": "openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "product_id": "openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g25b98d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "product": { "name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "product_id": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-problem-detector-rhel8\u0026tag=v4.10.0-202207291908.p0.ga11df08.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "product_id": "openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "product_id": "openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.10.0-202207291908.p0.g5f4c899.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "product": { "name": "openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "product_id": "openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.10.0-202207291908.p0.g2c9c76e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "product": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "product_id": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "product_identification_helper": { "purl": "pkg:oci/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210?arch=amd64\u0026repository_url=registry.redhat.io/openshift4/ose-vsphere-csi-driver-syncer-rhel8\u0026tag=v4.10.0-202207291908.p0.ge310f4d.assembly.stream" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "product": { "name": "openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "product_id": "openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler\u0026tag=v4.10.0-202207301627.p0.g012b960.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "product": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "product_id": "openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g0716ee4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "product": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "product_id": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-etcd-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.ga918723.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "product": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "product_id": "openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-monitoring-operator\u0026tag=v4.10.0-202207291908.p0.g1ec9353.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "product": { "name": "openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "product_id": "openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-network-operator\u0026tag=v4.10.0-202207291908.p0.g837ad53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "product": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "product_id": "openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-node-tuning-operator\u0026tag=v4.10.0-202208011505.p0.g73f9609.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "product": { "name": "openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "product_id": "openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-version-operator\u0026tag=v4.10.0-202207291908.p0.g288bd4d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "product": { "name": "openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "product_id": "openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-configmap-reloader\u0026tag=v4.10.0-202207291908.p0.g22a40ce.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "product": { "name": "openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "product_id": "openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-coredns\u0026tag=v4.10.0-202207291908.p0.g3ec1ee7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "product": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "product_id": "openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher-rhel8\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "product": { "name": "openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "product_id": "openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-attacher\u0026tag=v4.10.0-202207291908.p0.g27e71f2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "product": { "name": "openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "product_id": "openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "product": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "product_id": "openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-livenessprobe-rhel8\u0026tag=v4.10.0-202207291908.p0.g8c1a5bc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "product": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "product_id": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar-rhel8\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "product": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "product_id": "openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-node-driver-registrar\u0026tag=v4.10.0-202207291908.p0.gbb0bd82.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "product": { "name": "openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "product_id": "openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "product": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "product_id": "openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-provisioner-rhel8\u0026tag=v4.10.0-202207291908.p0.g31de1e1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "product": { "name": "openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "product_id": "openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-proxy\u0026tag=v4.10.0-202207291908.p0.g799d414.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "product": { "name": "openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "product_id": "openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-alertmanager\u0026tag=v4.10.0-202207291908.p0.g0133959.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "product": { "name": "openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "product_id": "openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-node-exporter\u0026tag=v4.10.0-202207291908.p0.g0eed310.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "product": { "name": "openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "product_id": "openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus\u0026tag=v4.10.0-202207291908.p0.g3c6cd55.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "product": { "name": "openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "product_id": "openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-grafana\u0026tag=v4.10.0-202207291908.p0.g48aec35.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "product": { "name": "openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "product_id": "openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-proxy\u0026tag=v4.10.0-202207291908.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "product": { "name": "openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "product_id": "openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-rbac-proxy\u0026tag=v4.10.0-202207291908.p0.g4f198b2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "product": { "name": "openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "product_id": "openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-state-metrics\u0026tag=v4.10.0-202207291908.p0.g088ab06.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "product": { "name": "openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "product_id": "openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-marketplace\u0026tag=v4.10.0-202207291908.p0.g80b92ec.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "product": { "name": "openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "product_id": "openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-cni\u0026tag=v4.10.0-202207291908.p0.g5059ec2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "product": { "name": "openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "product_id": "openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-server-rhel8\u0026tag=v4.10.0-202207291908.p0.g245b95f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "product": { "name": "openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "product_id": "openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-builder\u0026tag=v4.10.0-202207291908.p0.g24d8db4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "product": { "name": "openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "product_id": "openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "product": { "name": "openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "product_id": "openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console\u0026tag=v4.10.0-202208021356.p0.gdee1944.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "product": { "name": "openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "product_id": "openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-console-operator\u0026tag=v4.10.0-202207291908.p0.g7e488d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "product": { "name": "openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "product_id": "openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-deployer\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "product": { "name": "openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "product_id": "openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-haproxy-router\u0026tag=v4.10.0-202207291908.p0.g11109e4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "product": { "name": "openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "product_id": "openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-hyperkube\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "product": { "name": "openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "product_id": "openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-pod\u0026tag=v4.10.0-202207291908.p0.g012e945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "product": { "name": "openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "product_id": "openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-docker-registry\u0026tag=v4.10.0-202207291908.p0.g534ab3a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "product": { "name": "openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "product_id": "openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tests\u0026tag=v4.10.0-202207291908.p0.g4e11d23.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "product": { "name": "openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "product_id": "openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "product": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "product_id": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-state-metrics-rhel8\u0026tag=v4.10.0-202207291908.p0.ge5c50aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "product": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "product_id": "openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-lifecycle-manager\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "product": { "name": "openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "product_id": "openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-operator-registry\u0026tag=v4.10.0-202207291908.p0.g69bb8fe.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "product": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "product_id": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.gd85867f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g8ba0c7a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "product": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "product_id": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-ebs-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gc2e6dc1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "product": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "product_id": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-aws-pod-identity-webhook-rhel8\u0026tag=v4.10.0-202207291908.p0.g7f9eb87.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "product": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "product_id": "openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-installer-rhel8\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "product": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "product_id": "openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g20e2b86.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "product": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "product_id": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-baremetal-runtimecfg-rhel8\u0026tag=v4.10.0-202207291908.p0.g40c11f7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "product": { "name": "openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "product_id": "openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cli-artifacts\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "product": { "name": "openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "product_id": "openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cloud-credential-operator\u0026tag=v4.10.0-202207291908.p0.gef868a8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "product": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "product_id": "openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "product_identification_helper": { "purl": "pkg:oci/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/cloud-network-config-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8723adb.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "product": { "name": "openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "product_id": "openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-authentication-operator\u0026tag=v4.10.0-202207291908.p0.g6a015c7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "product": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "product_id": "openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-autoscaler-operator\u0026tag=v4.10.0-202207291908.p0.g8bcdccc.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "product": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "product_id": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-baremetal-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.gc6584b9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "product": { "name": "openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "product_id": "openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-bootstrap\u0026tag=v4.10.0-202207291908.p0.gf22d1c6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "product": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "product_id": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-cloud-controller-manager-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.ge2e0d4f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "product": { "name": "openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "product_id": "openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-config-operator\u0026tag=v4.10.0-202207291908.p0.g0840c6f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "product": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "product_id": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gace1862.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "product": { "name": "openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "product_id": "openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-dns-operator\u0026tag=v4.10.0-202207291908.p0.gbc48e0a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "product": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "product_id": "openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-image-registry-operator\u0026tag=v4.10.0-202207291908.p0.gd2df5e8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "product": { "name": "openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "product_id": "openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-ingress-operator\u0026tag=v4.10.0-202207301627.p0.g5001c08.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "product": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "product_id": "openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g696981d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "product": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "product_id": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gca3ff53.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "product": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "product_id": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-scheduler-operator\u0026tag=v4.10.0-202207291908.p0.gd8694a5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "product": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "product_id": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g7e1f568.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "product": { "name": "openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "product_id": "openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-machine-approver\u0026tag=v4.10.0-202207291908.p0.g95404c4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "product": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "product_id": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-apiserver-operator\u0026tag=v4.10.0-202207291908.p0.g853d84f.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "product": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "product_id": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-openshift-controller-manager-operator\u0026tag=v4.10.0-202207291908.p0.gb8b65d1.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "product_id": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g573ac47.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "product": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "product_id": "openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-policy-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.g8e5b365.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "product": { "name": "openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "product_id": "openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-samples-operator\u0026tag=v4.10.0-202207291908.p0.gd41950d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "product": { "name": "openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "product_id": "openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-cluster-storage-operator\u0026tag=v4.10.0-202207291908.p0.ge9e211d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "product": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "product_id": "openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-container-networking-plugins-rhel8\u0026tag=v4.10.0-202207291908.p0.g3123ef8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "product_id": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-rhel8\u0026tag=v4.10.0-202207291908.p0.gd06ff18.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "product": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "product_id": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-driver-shared-resource-operator-rhel8\u0026tag=v4.10.0-202207291908.p0.g662615b.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "product": { "name": "openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "product_id": "openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "product": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "product_id": "openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-resizer-rhel8\u0026tag=v4.10.0-202207291908.p0.ge593409.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "product": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "product_id": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "product": { "name": "openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "product_id": "openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-external-snapshotter\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "product": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "product_id": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "product": { "name": "openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "product_id": "openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-controller\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "product": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "product_id": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-csi-snapshot-validation-webhook-rhel8\u0026tag=v4.10.0-202207291908.p0.gfe4a0a2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "product": { "name": "openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "product_id": "openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "product_identification_helper": { "purl": "pkg:oci/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/egress-router-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5c56bc8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "product": { "name": "openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "product_id": "openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-etcd\u0026tag=v4.10.0-202208020345.p0.g7afa17c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "product": { "name": "openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "product_id": "openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-hypershift-rhel8\u0026tag=v4.10.0-202207301627.p0.gd78564a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "product": { "name": "openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "product_id": "openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-insights-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.g85bb6ef.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "product": { "name": "openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "product_id": "openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer-artifacts\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "product": { "name": "openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "product_id": "openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-installer\u0026tag=v4.10.0-202207291908.p0.g6db5fb9.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "product": { "name": "openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "product_id": "openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-base\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "product": { "name": "openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "product_id": "openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-maven\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "product": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "product_id": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-jenkins-agent-nodejs-12-rhel8\u0026tag=v4.10.0-202207291908.p0.gc5b7159.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "product": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "product_id": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-kube-storage-version-migrator-rhel8\u0026tag=v4.10.0-202207291908.p0.g901a6d2.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "product": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "product_id": "openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-libvirt-machine-controllers\u0026tag=v4.10.0-202207291908.p0.g3b330b7.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "product": { "name": "openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "product_id": "openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-operator\u0026tag=v4.10.0-202207291908.p0.gca4a4c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "product": { "name": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "product_id": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-aws-rhel8\u0026tag=v4.10.0-202207291908.p0.g518b028.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "product": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "product_id": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-api-provider-openstack-rhel8\u0026tag=v4.10.0-202207291908.p0.g2401f74.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "product": { "name": "openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "product_id": "openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-machine-config-operator\u0026tag=v4.10.0-202207291908.p0.gdc29945.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "product": { "name": "openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "product_id": "openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-admission-controller\u0026tag=v4.10.0-202207291908.p0.gd7a7fe5.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "product": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "product_id": "openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-networkpolicy-rhel8\u0026tag=v4.10.0-202207291908.p0.gbfcc6c8.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "product": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "product_id": "openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-route-override-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g707dd38.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "product": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "product_id": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-multus-whereabouts-ipam-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.ga8d68d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "product": { "name": "openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "product_id": "openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-must-gather\u0026tag=v4.10.0-202207291908.p0.gdb7f815.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "product": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "product_id": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-network-interface-bond-cni-rhel8\u0026tag=v4.10.0-202207291908.p0.g5ccc626.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "product": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "product_id": "openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-network-metrics-daemon-rhel8\u0026tag=v4.10.0-202207291908.p0.g234c138.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "product": { "name": "openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "product_id": "openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "product_identification_helper": { "purl": "pkg:oci/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/network-tools-rhel8\u0026tag=v4.10.0-202208012036.p0.gbcfec9c.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "product": { "name": "openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "product_id": "openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-sdn-rhel8\u0026tag=v4.10.0-202208011505.p0.g474a107.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "product": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "product_id": "openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-oauth-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.geffa26a.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "product": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "product_id": "openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-apiserver-rhel8\u0026tag=v4.10.0-202207291908.p0.g5eabbaa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "product": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "product_id": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openshift-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.g2c2d50d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "product": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "product_id": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cinder-csi-driver-rhel8-operator\u0026tag=v4.10.0-202207291908.p0.gcb58fe4.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "product": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "product_id": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-cloud-controller-manager-rhel8\u0026tag=v4.10.0-202207291908.p0.gdf0b27d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "product": { "name": "openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "product_id": "openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-openstack-machine-controllers\u0026tag=v4.10.0-202208012326.p0.gf6b5171.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "product": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "product_id": "openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel7\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "product": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "product_id": "openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "product_identification_helper": { "purl": "pkg:oci/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ovirt-csi-driver-rhel8\u0026tag=v4.10.0-202207291908.p0.g633cbb6.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "product": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "product_id": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovirt-machine-controllers-rhel8\u0026tag=v4.10.0-202207291908.p0.g35ce9aa.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "product": { "name": "openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "product_id": "openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-ovn-kubernetes\u0026tag=v4.10.0-202208012036.p0.g464b78d.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "product": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "product_id": "openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-k8s-prometheus-adapter\u0026tag=v4.10.0-202207291908.p0.g4052b31.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "product": { "name": "openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "product_id": "openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-service-ca-operator\u0026tag=v4.10.0-202207291908.p0.g1611373.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "product": { "name": "openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "product_id": "openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-thanos-rhel8\u0026tag=v4.10.0-202207291908.p0.g10ca1d3.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "product": { "name": "openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "product_id": "openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-tools-rhel8\u0026tag=v4.10.0-202207291908.p0.ge29d58e.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "product": { "name": "openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "product_id": "openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-config-reloader\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "product": { "name": "openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "product_id": "openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prometheus-operator\u0026tag=v4.10.0-202207291908.p0.g73ddd44.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "product": { "name": "openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "product_id": "openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-prom-label-proxy\u0026tag=v4.10.0-202207291908.p0.g5f4c899.assembly.stream" } } }, { "category": "product_version", "name": "openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "product": { "name": "openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "product_id": "openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "product_identification_helper": { "purl": "pkg:oci/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48?arch=arm64\u0026repository_url=registry.redhat.io/openshift4/ose-telemeter\u0026tag=v4.10.0-202207291908.p0.g2c9c76e.assembly.stream" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64" }, "product_reference": "openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64" }, "product_reference": "openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le" }, "product_reference": "openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x" }, "product_reference": "openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64" }, "product_reference": "openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64" }, "product_reference": "openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le" }, "product_reference": "openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x" }, "product_reference": "openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64" }, "product_reference": "openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64" }, "product_reference": "openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64" }, "product_reference": "openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64" }, "product_reference": "openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64" }, "product_reference": "openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64" }, "product_reference": "openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64" }, "product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64" }, "product_reference": "openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64" }, "product_reference": "openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64" }, "product_reference": "openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64" }, "product_reference": "openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64" }, "product_reference": "openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64" }, "product_reference": "openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64" }, "product_reference": "openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64" }, "product_reference": "openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x" }, "product_reference": "openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le" }, "product_reference": "openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x" }, "product_reference": "openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le" }, "product_reference": "openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64" }, "product_reference": "openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64" }, "product_reference": "openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64" }, "product_reference": "openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x" }, "product_reference": "openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le" }, "product_reference": "openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64" }, "product_reference": "openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64" }, "product_reference": "openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x" }, "product_reference": "openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le" }, "product_reference": "openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x" }, "product_reference": "openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le" }, "product_reference": "openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64" }, "product_reference": "openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le" }, "product_reference": "openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64" }, "product_reference": "openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64" }, "product_reference": "openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le" }, "product_reference": "openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le" }, "product_reference": "openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le" }, "product_reference": "openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64" }, "product_reference": "openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64" }, "product_reference": "openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64" }, "product_reference": "openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64" }, "product_reference": "openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x" }, "product_reference": "openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le" }, "product_reference": "openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x" }, "product_reference": "openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64" }, "product_reference": "openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le" }, "product_reference": "openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x" }, "product_reference": "openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64" }, "product_reference": "openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x" }, "product_reference": "openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64" }, "product_reference": "openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x" }, "product_reference": "openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64" }, "product_reference": "openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64" }, "product_reference": "openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64" }, "product_reference": "openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x" }, "product_reference": "openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64" }, "product_reference": "openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le" }, "product_reference": "openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64" }, "product_reference": "openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64" }, "product_reference": "openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64" }, "product_reference": "openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le" }, "product_reference": "openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x" }, "product_reference": "openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64" }, "product_reference": "openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x" }, "product_reference": "openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64" }, "product_reference": "openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le" }, "product_reference": "openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64" }, "product_reference": "openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64" }, "product_reference": "openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64" }, "product_reference": "openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le" }, "product_reference": "openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64" }, "product_reference": "openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64" }, "product_reference": "openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64" }, "product_reference": "openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64" }, "product_reference": "openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le" }, "product_reference": "openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le" }, "product_reference": "openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x" }, "product_reference": "openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x" }, "product_reference": "openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le" }, "product_reference": "openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le" }, "product_reference": "openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64" }, "product_reference": "openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64" }, "product_reference": "openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64" }, "product_reference": "openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x" }, "product_reference": "openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x" }, "product_reference": "openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le" }, "product_reference": "openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64" }, "product_reference": "openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64" }, "product_reference": "openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64" }, "product_reference": "openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x" }, "product_reference": "openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64" }, "product_reference": "openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le" }, "product_reference": "openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x" }, "product_reference": "openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le" }, "product_reference": "openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64" }, "product_reference": "openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64" }, "product_reference": "openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x" }, "product_reference": "openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64" }, "product_reference": "openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le" }, "product_reference": "openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64" }, "product_reference": "openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64" }, "product_reference": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le" }, "product_reference": "openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le" }, "product_reference": "openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x" }, "product_reference": "openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le" }, "product_reference": "openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64" }, "product_reference": "openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64" }, "product_reference": "openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le" }, "product_reference": "openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x" }, "product_reference": "openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64" }, "product_reference": "openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x" }, "product_reference": "openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64" }, "product_reference": "openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64" }, "product_reference": "openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le" }, "product_reference": "openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64" }, "product_reference": "openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64" }, "product_reference": "openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le" }, "product_reference": "openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x" }, "product_reference": "openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le" }, "product_reference": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64" }, "product_reference": "openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le" }, "product_reference": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64" }, "product_reference": "openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64" }, "product_reference": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le" }, "product_reference": "openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le" }, "product_reference": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64" }, "product_reference": "openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64" }, "product_reference": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le" }, "product_reference": "openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64" }, "product_reference": "openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le" }, "product_reference": "openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64" }, "product_reference": "openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64" }, "product_reference": "openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x" }, "product_reference": "openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64" }, "product_reference": "openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le" }, "product_reference": "openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64" }, "product_reference": "openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64" }, "product_reference": "openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le" }, "product_reference": "openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x" }, "product_reference": "openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64" }, "product_reference": "openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64" }, "product_reference": "openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le" }, "product_reference": "openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x" }, "product_reference": "openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x" }, "product_reference": "openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le" }, "product_reference": "openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64" }, "product_reference": "openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64" }, "product_reference": "openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le" }, "product_reference": "openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64" }, "product_reference": "openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64" }, "product_reference": "openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le" }, "product_reference": "openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64" }, "product_reference": "openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64" }, "product_reference": "openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x" }, "product_reference": "openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64" }, "product_reference": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64" }, "product_reference": "openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64" }, "product_reference": "openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64" }, "product_reference": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le" }, "product_reference": "openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64" }, "product_reference": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64" }, "product_reference": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x" }, "product_reference": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le" }, "product_reference": "openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64" }, "product_reference": "openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64" }, "product_reference": "openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le" }, "product_reference": "openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64" }, "product_reference": "openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le" }, "product_reference": "openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64" }, "product_reference": "openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x" }, "product_reference": "openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le" }, "product_reference": "openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64" }, "product_reference": "openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le" }, "product_reference": "openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x" }, "product_reference": "openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64" }, "product_reference": "openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64" }, "product_reference": "openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le" }, "product_reference": "openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le" }, "product_reference": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64" }, "product_reference": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64" }, "product_reference": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x" }, "product_reference": "openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64" }, "product_reference": "openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64" }, "product_reference": "openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64" }, "product_reference": "openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le" }, "product_reference": "openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64" }, "product_reference": "openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64" }, "product_reference": "openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64" }, "product_reference": "openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64" }, "product_reference": "openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x" }, "product_reference": "openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x" }, "product_reference": "openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le" }, "product_reference": "openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le" }, "product_reference": "openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x" }, "product_reference": "openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le" }, "product_reference": "openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64" }, "product_reference": "openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64" }, "product_reference": "openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64" }, "product_reference": "openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le" }, "product_reference": "openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le" }, "product_reference": "openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64" }, "product_reference": "openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x" }, "product_reference": "openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64" }, "product_reference": "openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64" }, "product_reference": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le" }, "product_reference": "openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64" }, "product_reference": "openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le" }, "product_reference": "openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64" }, "product_reference": "openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64" }, "product_reference": "openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x" }, "product_reference": "openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x" }, "product_reference": "openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le" }, "product_reference": "openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64" }, "product_reference": "openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64" }, "product_reference": "openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64" }, "product_reference": "openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le" }, "product_reference": "openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le" }, "product_reference": "openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64" }, "product_reference": "openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64" }, "product_reference": "openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x" }, "product_reference": "openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64" }, "product_reference": "openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le" }, "product_reference": "openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64" }, "product_reference": "openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x" }, "product_reference": "openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le" }, "product_reference": "openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" }, "product_reference": "openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64" }, "product_reference": "openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64" }, "product_reference": "openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64" }, "product_reference": "openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64" }, "product_reference": "openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64" }, "product_reference": "openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64" }, "product_reference": "openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x" }, "product_reference": "openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" }, "product_reference": "openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64 as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "relates_to_product_reference": "8Base-RHOSE-4.10" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le as a component of Red Hat OpenShift Container Platform 4.10", "product_id": "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" }, "product_reference": "openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.10" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "known_not_affected": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-09T02:34:48+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5875" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "known_not_affected": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-09T02:34:48+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5875" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "known_not_affected": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-09T02:34:48+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5875" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "known_not_affected": [ "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-08-09T02:34:48+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html", "product_ids": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5875" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:1126931b230ac684a4874e46c823baaa7d28f8439f288b9bf85af85ce6083111_amd64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:712dba626864745a52cefcec0aa8386a467169563f33756ef554e5985b17ae3d_arm64", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:739fbbf50ce1cd34c567276f2c144c082a0d5a583591996be2ef940b7c681138_ppc64le", "8Base-RHOSE-4.10:openshift4/cloud-network-config-controller-rhel8@sha256:946f1f2fb3a6e48e4932f9859bb026510fa96716b0efac184729b8f9c7473090_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:5d2648f9eaef5471b89cac5b60eae7844a7d18343d8f22250f4cf08b493a6a5d_ppc64le", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:76cc8f13389474f76250aeccb6d5379ec4fc77befdc5529df1878f537117faa2_amd64", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:f8e641d11337b69c64ea31fee3569627f0af1c831a87c819139ad54737eb6094_s390x", "8Base-RHOSE-4.10:openshift4/egress-router-cni-rhel8@sha256:fc2100ad6e334a715e9d24ce7f341c8f1dc6cae66ed70b3dd88c53264e65d2a5_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:124ff310bc5319e10c72c9e7afe870cd47dd6177c9939ba6b665b4b154736040_arm64", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:7ae14bb14689deb0d43cecf26fb777706ecc90ccfaf019077a84f982d44eccdd_ppc64le", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:b04c68bbbb95a7e1c6ce534e5a50d14428ca6abd4ce1e111f3d2548ce4dd6a5c_s390x", "8Base-RHOSE-4.10:openshift4/network-tools-rhel8@sha256:fb403cebee7478b119b63f788115f72b3c1292bb422b97c1e5f041b8ebc035da_amd64", "8Base-RHOSE-4.10:openshift4/oc-mirror-plugin-rhel8@sha256:02cc44ada523d5f2d29459aa3b97c638d0a87a556327f7cabba4ed0bbc37444b_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-controller-manager-rhel8@sha256:404b6bbc254fc3384ac5acade972860d9c773ad206feb820cf165bbaf615307d_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-cloud-csi-driver-container-rhel8@sha256:3affa060680c1cd51d5ba0ee6e107336e50ea6ad756ff43b88ee06296612b536_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-disk-csi-driver-operator-container-rhel8@sha256:d3f0f2c81c2607578732d768be3886b3639c2e5f4ed08626e5f078bb701d976a_amd64", "8Base-RHOSE-4.10:openshift4/ose-alibaba-machine-controllers-rhel8@sha256:f69b2c10c3e5ca633199de67a42d117dce9f2f6448036bf4be3dfc6b49af17f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:6bd548e135b814c9ed0ea85ad204f6aae8564e0f46663883e32b92e26384e484_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-cloud-controller-manager-rhel8@sha256:79cbeda6c628858323a181506bf7fd733bef2beb4969e1ccdd4f71216bb30f15_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:470478298a68db5362e71e535f303334bcb970868b43c83885ad18fe1adea285_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8-operator@sha256:eeb534884cf73467a2fd9414ba3acc3cabb746d7697d8d58e6ce95283443788b_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:208fe0af4223f2d4effedeacca917f4e45c8e4f231e1dfc17a04d1fc8eb767bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-ebs-csi-driver-rhel8@sha256:575d681c2ba87e3aecb0cda7109b8220d36be8c23471f911004962f0728cf118_arm64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:0297a450c33959c907fc6696b39f54ae83b4c677761b030aaae35d2429c97a76_amd64", "8Base-RHOSE-4.10:openshift4/ose-aws-pod-identity-webhook-rhel8@sha256:55a748563a522e5d84fc945ddea1aeffc1d3a10e29d688a1221b96d746c13698_arm64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-controller-manager-rhel8@sha256:681a83339a7dda4b05e972474dde159be1dc44dc1580e389d0a99e93ef8c323a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-cloud-node-manager-rhel8@sha256:0ec8faa816bba55a9a00a4c1c50ee9e3703e2d6298b669d23545e924923d0162_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8-operator@sha256:5c70424147060b967fbc4d952eb5405fad9391591b99f94968cd876ac8045a14_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-disk-csi-driver-rhel8@sha256:e82cae2a09c7dea1c9d66f7744ca7258554bd45e2664d3e51c9b438a2d3fc020_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-operator-rhel8@sha256:88ba3bf28db343c2a2805ef44babe86dbf74217a60b9ff66934217d3fab5099a_amd64", "8Base-RHOSE-4.10:openshift4/ose-azure-file-csi-driver-rhel8@sha256:2e0cf032437ab4a3548e06483810eb003221743f62babf7c204bf869e2768041_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:2635521c2cac892485dbfc61ca7bdd11cb897cfe20ac31d4fd234a104f42b189_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:81e86d43dfc0c2b7232504089e2999fbf2b14c4df79aec21e62ac56eb9070662_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:93fb7651e09938b1ea9ae68a9ee4dcf97124697892c41dafb7b5447112a0f735_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-installer-rhel8@sha256:be7d61217225039d66273242f3676152137865cb4403663ec66ea7e03337f23f_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:48d17716993b5266b4eb10e4ba5e7f4e9e703ba8c4209d81d16e282cf654d19e_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:94f050cc87eb8af33b9678e947f15fdb6818ae5cb09866602b3ce0d3f3e4a838_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:b8fe314f2ceca048eef26d0028a3fb0ea24db1975137b502a4f4f868acd147c7_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-machine-controllers@sha256:f607fecc161da4a74e1f534c497745ba4e4774b939586c706f4fcfa057b74379_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:04a11e30c6a4639919b51c82b0b9ec550843d5120f1e52bb5f34d2ec7f7b2c6b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:119ebb5dac4c9ccab090e20a805306ca175cc5308386b150fa5211f431008ef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:55cd7b5fea44c6ca6c10fc515054273a93ef4fc0e1cfb199fc57db90d342b809_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-rhel8-operator@sha256:baabc0b8184f6f57cedc6c7c7ae70cbd9751853f7ddd6d6f7e4d9b9f80b06e4a_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:11b5c413927f342aa95ee44cc826ffa22c2ea21e00ebd6d28b2eb521018ca131_amd64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:354f01e51d1f4ec189e8579c5709732fa667a6fe6f44aff9555d93a6d4015c17_arm64", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:bbc4f355ea78d9a284ea30e020f6c5126d1401ec3ccfa4779d7795456df75639_s390x", "8Base-RHOSE-4.10:openshift4/ose-baremetal-runtimecfg-rhel8@sha256:e37e8939d6bbef8f912d76a8fb525a877df78e6f33f6bd2b2d325b08356efb69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:3a04d5cfd7ab67acfd0797409e67a093a1adb2c6bcfa7babe7f1d5313ac73c19_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:99b8eae0e7dce24f85b4d1c66cfd018db1b3489b3c1040079b275986aac13bdf_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-alt-rhel8@sha256:b03b7e931356494d1084c8bec1d8fa3602553d28f01c4c712034152adaf45f29_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:65850ba6b9e04356838851cf7923560fb2f2dd63fe68e15b0989bc75332f5388_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:6c0f1899b966147a17d950f52b3d3db119d414f572cc70328fb1d1d3ee688c26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts-alt-rhel8@sha256:f20e00b0bdd92c5e3bd3a97214c28c348276b23310d0e3ebe5ffb4da4b4afdf8_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:1b5c4f35e0324eec5f2241c34a01e64acbabd7282698c2bdd31be4260d2db05b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:b0704e217437d1032a87a47591a336cbf3598b6d3fe344e9b228795499f412ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ce339ee4f6891b78f7bfc527627156b8ef23d5a776c2a4cded263179de9b030c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cli-artifacts@sha256:ebdab7faf277f9edc070fb7ebfa9f72d64e068c212d964d8fa979e0eb375cb15_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:085c3a1eefcb54406622f7414966172d9787cae3fc33da003508a955d0f9b220_s390x", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:42533ec8868f343dd1d2caf593ab1be481914f72a18d8d5f212cc3ce48c86005_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:c738f490c6465ef58c567a6d1bc7272d7619c6eaedf044548ec2e44f7c81daa4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cli@sha256:dcc50c43cc69c4401108568b138ad71c16ed3463f322957003dd114b3858c238_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:1a92bd78cec7c21cc8a002f9439ebc105ac5ea65e2c320016974629f51d2b635_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:43859cb06685f90976c892c3a3aa759a2dfdaa965b764ac13ac81be55ce2c645_arm64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:92c9b2f2ae162e18c8ea850a549a6ffcc655d141eece53181ccbcf47d71bce2e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cloud-credential-operator@sha256:d6452910fedfd29e95728e1cf63dc12b8a234d231a4f5a13ead3afb82665feef_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:c2fb6fee2c7f74ff1e60781f1bb5865736cc355aee1abb6e5cad911a3145ed12_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:d2dfd29446097500f8020a31afe586b675432e2b4535b211aaa8c2808aa1aa6c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:f214f5c78d4cff0031e2831b9313529dcde1bff126f3fa52699e2e184df8a9ee_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-authentication-operator@sha256:fe149b2763a315fc299441596395b6b5097d289f72b644787221b63cf78bc79d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a2d634994473efa9c120929b4196c31636ffdf3ccce19031e20fabdbc457e135_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:a788f4d87bf3194a528676f8b417006a7d04702653c181fc9d88e52acdd79e1e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:b916495223229ee5764b96fb613199be3ab9331893d3849a95fc8a948b89714c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler-operator@sha256:d9a2dbdf84a31996a8c121903c2b1b83639833a2a39d66be944312a03a426718_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:351aa9daa288e2488d32477462b450ac23a41f350d6fa3de8e829883aee214b1_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:8059fb7dcc798ce773d8ca31f42909d518cc615a977d3380316bc1a9b574c2e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:bba297f4908b52bbb2fcf0800ada58e619a9c5291933bf0004c5b1a7c6d7f94a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-autoscaler@sha256:c5806350c12e9ce552b926a47926d759b62be00a2274a22232089f952d83d605_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:47e6728605b372e75ed0574cf21fe9ff32f48cd037f14bf114983f033ed8a149_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:86faf79096b03fc179982b79b43b14865bdc6a6d0006f896ebbeacaf5d6aaf8a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e226fb26b339072f1549445a5990af550c3fa27a23783b5e3fb85b31241a41ba_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-baremetal-operator-rhel8@sha256:e3c0b571fce70ccc4a05134b9da3cf4eb83e97b7d6a54e1b4c438f5dfc40d071_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:c4a54cf9d783f0a483604536a550aaac982236234023f17db69e1624051b9360_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:d7825465b967c5ba2003855341647adca4a1b8b6d7ac8631df792a6eccfefb41_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:dc00e2baef56149f29e79cf9b38f15ea2d6a2c9b7ebfe9772a01827d191ffef4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-bootstrap@sha256:eb57f5d18491e7c3d317c8a33035fceb83c23bc3bf64a0cd2a66176320c1094c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:0f075be5bbb2f15a03c4b368e6ddde80629fe227479f7b26cfac84f6a106cae8_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:4ec122b0129fd98182c795e5eaa3fb83eaa0446a3788cd5c5630408a31a97a93_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:57f7b3a45cce0f22c9540fddcb0488841ee8f3aeef4de93bb18e15dc354563cb_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-cloud-controller-manager-operator-rhel8@sha256:c278bcc262224c14331d09033687ddb5c4b955d1a33f15016cde166417778f1a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:3955eea78adc1e7116a16b0c064bb4264e7b904dff11ffb270bd2111bc03cd11_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:567d94364549e7bdfdeecc27ffc5a1516cd6470fa977a077b5f51b784866d37e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:cddfbff886aa2ed1562be9bb80cc05dd04a2000098148cc8fd098bf5b307fcf6_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-config-operator@sha256:da0b947f09fa243e43c0eede2b40bb3bf23316f22632e4e371e1d4ef7e561f65_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:309fca7332aee380b917fd1b0f083e35b963b6245c3455f6327eab3eb47fd5e9_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:3ec0411a98fc5a6d9822ffe229a56b1f59ce11c4dfe2fc60f88431e015248e9c_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:46a8c9768e363f53d44a911574998aa6b335001b29115cdb667e86ce0f9b29d0_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-csi-snapshot-controller-rhel8-operator@sha256:b9877a976bb9269446b64afaf97e3e12308c08fb3e2392a582264f0510754490_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:419db6a3f5ad7a23bd361bbe8cadbd1f891321877c7166f9658dc1de939d6450_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:bb25eb0da19a7d6c5f1472557a990617462630b131080aef87e21786a85290ba_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:ee0c75a6746f5dc84bba158fe2a2265d9920aa28aa22507b15d02fbc901ae514_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-dns-operator@sha256:fd7d342c9feda5a23cf67abc0b85e23b223a30db3ad99706ae58608b50426da8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:2569ee83c4413500c544f136530bc3503ee93c38f78924336259ff065f5dea6a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:92d0658dd116cdc9ebe3eed55e2b260f59cfcd0e4b4a02d696c2dc68362c560b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:b43caad0fab53f9b165420141c7490998d95fb23305e54b5091a7baae63295bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-etcd-rhel8-operator@sha256:d217728cbfa11653eaeb19cdaf2a0f17e45a68b50bb8604ade2c949015937bee_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:9756cc1bd652816090f3a115133dba77fd00d22f232fb124be79e9a4b522843a_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:b0e48b9cdbdeb1190095a1abee50343c6d1fc91bbc1fd76378ede07377713ede_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:bd3675dc2a121d6e86af5882e2bb10ca5597fd57c0623faf2c319a301a46eb8f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-image-registry-operator@sha256:f2ab35191735dc5f0776ab1f5f00ea434c9043cce414de1c59360bde1af8894c_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:02e2ba7685ba800a4a8e5b5cbf6e4dbe83af6edb3fee5b851af2734a6a2c0118_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7c1827ee8b8ae48e3aa2f6f40bcb8f43a4ed959252f93b46941d77bf3873e6fe_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:7d0ebba158398b693bd614870b9f2066bcad667b06685e598f36aac06ced1752_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-ingress-operator@sha256:a87e373324960f26e235524ac02dfe1e889023c76d4ec9493309a29eb79a4007_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:045f0416ea461976595ca32ec7bc9b1a7311c9f8368b4a32343d0477b639b828_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:1669781d0414307e05381ce03a76d94795edc124a33afc517b3dfbc9a1b473da_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:b37ea29501cdf4c46549033653f962de21b8340ba03efae10c555624d3cf45b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-apiserver-operator@sha256:ff759e84390671526103e0d339cff8f309b0dc583e5ed0be4c6324d41bc61483_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:15c445e9e2d223b73f6298949c9a7fd65339d427e0796ab805246560d524ed10_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:35edd1871d957562bd55cf6cde6008557d4fe576b8d14a426365ef05e16f7a62_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:7531944e73ca955c17cde2588b87ad5a3daac6af3c320bf1cc5a9db3a6b9d4e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-controller-manager-operator@sha256:9936422c9f65360d5d5b3e3f657b5575ff9b87cf672a2b528d4683c2af394d3b_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:6f2ae4a744f530968ac57e74416252616d5e024360f1e70426233afe2a7636b4_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:ac72b9433cd9303e34d5aa4a2855ee8c26f8a8388c4a88e61f072a6409c1a41b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:c17513807aa01016e47de8256c32c1bc2842e57b3c6ff57c20c3a05558330938_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-scheduler-operator@sha256:e866ff8c7a64fe595a1bc2244225090a134356a08d566784d1467a653095c99d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:75ac80614f725a35d664a6c9a19a27a6c51c9e9841c4e52ce2336f0a03dcba1c_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:9b7971eb6463b7ad143f2496d58d4b791e53a91029d845e02f1eb86a247fa7c2_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:cc11ead304af30a2b4b9cb7741eb5e944f8b8c081dadd6e15b0b6dafe916df66_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-kube-storage-version-migrator-rhel8-operator@sha256:ecfacff2b725bf75643f673b8f6cd1dbd9aba8912b0e67915783ca40667f16f1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:5e9cdfc5639ea5736d20c5a234dd795cc0fde696da3e56e7c0a578a4a28c3c97_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:8ef0b87afcc61b542ac3c97a9c731bc478eb2d61531537be1745e63c2b643af7_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:9b1b8a6bb472301bce18b731ba917a0d268def60f85f2592ac52a8be0d9be371_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-machine-approver@sha256:f3110867711581ce5f53d212a9903d4e2ca3ffec88a4845d6931d5b20e97c72f_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:0e1b6c13771d6cdccc7baa949b7b21ea370ec5242525c11bdd555ba6d71df7c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:929d1f26dba12d5ed2a81ef5ce8feab04c09123ce70fadb98e25667dfdae72d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a55ab238f309057c54d8bcc3513f6563b20db6460985a28257d40fcbb0d16865_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-monitoring-operator@sha256:a68df9de64787effd687cda4c1ec0503861c4bd734bd1a4f2d3a1695c9380c68_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:05e4072110627f14c2cb3978faea11809861e34be396d09b20c0140687b31be6_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:a1b55ed6a260018cfb0dec557bf6c41ef2b625ba54a4f4ca4ab2faccde3ed76a_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:c985f57a1e5d43c656bdbea63bd867cdc1497495a5e949d1c86250151b5dce8e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-network-operator@sha256:fa4753887a7520132e6107c5daaefe5443939035e88bd463f9fb3df0f0676771_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:77c6109c9c25f7aea71bb611784f0b98f1b889e17f878dca023872ddff443633_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:a73ad4c1cf27d696b4ddafc4ff3438656f249bbbe54fe00001751d9b133adf9e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:bfa7024bd0bb0e40b99807656e8c3441b0a158df34b865c4b998f9d6c4560c5e_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-node-tuning-operator@sha256:e528dc29965d56a70e28cb77c8e6759e488dac6d8a4e92ef5544cb670e448efd_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:201a23a774633afff880e5e1154b2e66bdc4c18707032d4fe4ef906f8950e19f_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:40b3e02cc0af8c57bc4fb06e19eebc11fe250e57da5a4c8e657b32302bb16790_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:9a31c94b8e79060d7f79dbbc6859cdcb9ba64435aa1703950dc55226af160864_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-apiserver-operator@sha256:b5a0a7dd655f83339cd43c846f6069762cd43471830d726d4ab0946325c8fd30_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:081758b25fdc89926a939bac719ec027463c519b2eac1cbb5abe0c1914947272_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:116fad4684ae0eee9797a0dee23cb9c551ef5063a5bbac78d84b3775c76f16cb_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:371afd1409ea486c364fbe08a14fb3ae9d5dc3b4f28405fd1e22424f43643b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-openshift-controller-manager-operator@sha256:a92d2b0cb045ad06bd98221ee40e5a9ba6717bbf33b91f1dfb53bcd90be449d3_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:1c3b6c93f13a01dec3ffa68ae0f2a89286efd6c50681c52ef6f400fd5c5958e4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:9767ddc97873001a50136c29bb6d61424b5b24a09c10660d24d72ae97e7fcc88_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:c6f85b909c3d1703597c0cf16c210514a1c89820f89e1e931e692f31e4a417a1_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-policy-controller-rhel8@sha256:cbdf035b63e76a001c8a54eeb219a5333afbcad65cd56ff5dd5c4fb8a24c1715_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:316fa1f780e02ea7358c280dd08760927e099da87a977e83098421b27e216c64_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:75a925d1db7fcf8cb236f5c88f296b8cbc38f5e72efd237122ed3dd673bd12e1_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:98d6568d27ade0871f7795a2f20fcd032c9241cb5a5bc278be6ce0e2cd6894a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-samples-operator@sha256:beddb5ec2f2d26db615b250df5d39b0777c512bc65e68e57df6b9db3c6fe68d9_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:12607ecb3a0629af7ebb9c03f425835b855a36a2a55429cef680d80a68aa2f1d_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:5425ba6dc614504b420e892ebe8cb0d51080101f93e95eee59495eee24152f24_amd64", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:cc6f544e46e318caeb3468eceab640ecf647d8eb955fc3710c4c026e70cb9833_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-storage-operator@sha256:e3acb383a326b3ece23ad3cc2a68e5e1e1350a5a3d3062150c3ecf83376276b2_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:92e6377df24e725001f3721fcdd159a98b5d4a2ec4defc4f80cfb7154e997132_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a07b5c8a03cb08931eeb426b2bd5d37a29ed2e40bcaa4b716b4d8ee12ccea22b_s390x", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:a092fc058c14dc68e48cc560204a1c8bdf8268f7300ebe910574ade6261bb03f_arm64", "8Base-RHOSE-4.10:openshift4/ose-cluster-version-operator@sha256:c76fc477bab086842e248a08b2760639ed26300168d9f285fd9eb10a2faf0d79_amd64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:07aa277c780b4089669c153837ccec5ebea9285f3d1d6105de2d6a1e7e91a34a_arm64", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:7e2633c0ab4876bfa3f7b617006ec97a70f6a9a25426d59f18507e0b3934d78f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:e998609db531096784c2d15207243521c2006e9f2edb776699dfcf901aa11c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-configmap-reloader@sha256:f60da7295965b261215a5a7f0c1fc0eaa257c6fb31829af772dd166a4fa6edf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:073219f98b6544ea078d46c7a8c677d3ffe7bba2e74d7855bf8e533cce924c1c_s390x", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:6d70dd7144b5a1af01e2bdfdb7fe569fb2059af1d78844c8ebf813359cf92578_amd64", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:7271fd9ed3105eb52f028158c7c73a8f5076e8ae1ce64f306680e7a4932f716b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console-operator@sha256:774c5b86ed77853055337d48485a8ca5344ec6606b4780e485a635b338ca3558_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:145b95d5693e17ab62ad576b8a9c1e1ab4b8eee42332a9a01c0aa9f3abb2fdf3_amd64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:39300827e4104922a0a611001218c811451f9759e293f3c45a6c8f074e9bced4_arm64", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:45ca300aad02a7bff8cc7470fc20dd77f72d7106d97f41cedc6a912bd05285e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-console@sha256:662bde56c2da45e3b5a0f9d4a327c63e50351c5f4626d2cd9eb0947e9b5b897a_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:5cfebf6ac5de92e5c3c6bdeb4adc90396db801ce78bd53f3e890104831e50036_s390x", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:7cdb51bcbe2346f8c9d34e6780d31a607cd914572bfe7badc7bdfea4517e75d6_amd64", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:9590bdfc0cc25314b5f993c4ca83a4a36d7a87eb980e49246f2149f1d4e306ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-container-networking-plugins-rhel8@sha256:fd6f05e80569ce391744890d5a2405e7cd4d89252c6e2562859231d40fcb68f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:041c64ba10542cba90ba1d9f4ceebfe18150c40bccc3d5e67b652ee0e6eed7ef_s390x", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:7c15e27aaef30a0ea087986633e0dae1b9e940346eb8c1860b265ad09491dfb3_amd64", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:916a724967decfeb5985230ef77171b2a2ad5b32b6a93d2f89dee44d44c68af1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-coredns@sha256:a923f55e596a713ce1311533ba29d4547b3b2f1e591ff7c40b8c60c92c535b4a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:2b09760a87efe03db757f0a6f950bb61ec65d4d0843938004ac083f6c3299316_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8-operator@sha256:95a4c6a6c838bb01d69f06d9176348c0771a334151e1b292bd01b2d993e017b4_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:00168c5f94eea3333a2697a52762b7dc96ad1cb365c367f7abef650c167ad213_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-manila-rhel8@sha256:bb58a45e09a880996ea31f497a452cb33f89955bbd072630ba77851e8e64abda_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:941ebbba0e6bf34932cc80fe94c69f81c00d2af1af3e1c51cf7c1e84fbba2885_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-nfs-rhel8@sha256:f212ebe9933d9fb33ff18a2ea0cb59593c06e1006ef9fe29550b41d60f753ce7_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:3ba03a77f18d345d5feae48aaf3f93e02486c353208bf51442c93bda8e6db99f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:5005918f95194d1c212c4281bbb133bcabb5dab7da74bab44ad1a1e43887cf39_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:6f9a618a9454d18499ed62dbde740e6b77957674749dba7a79f0918bb8a8de01_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-operator-rhel8@sha256:fa64dbd9ec5bcaf3c6b9a94596a9be4870d3d7e2fdfbeab5e587f254a14bf6a1_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:0cbc1b76943b0abbdd2a1de2df29bc4974203d3311119fc4381d9670e595ad79_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:4ec7b3f7ec58c7048608969eb8ee545a1fd4d80c80aecfe6f249eee0bdd9ba60_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:9f2b5236f3ce628041d4629ba419e578f2601a8ee46f88aac7c587bdc6f008be_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-driver-shared-resource-rhel8@sha256:e9358216767b925deca537697fb5b7e2c28afe508dfc664ba3f7d7b6a9300128_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher-rhel8@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:2ae2f17810a58c7bd77fc131e11bca8d3e427ae7156f4810da5d1a6071cf50c7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:c4b241ef660bbcb0e93003d22f4f1fe2af95ced5f9238aa47d0818e4d32c7a13_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:dd835d8c195712811830599c7cbd1c97d8a72f60e6bfda1122664416ac862143_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-attacher@sha256:e5502e3a8f74455767fdfc7379bc2b2488ccaf60699d6658b0c3632503dfcec5_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner-rhel8@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:060e06bc129287407170c77ea3572f1dd2879ef4ae6fe9971ec9210ab681f262_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:7fc070b667d5237a801169424a57271b398cc0254b1eda3432f230aa007f916d_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:bd8cdb659534570c544daf5c15576a75594179e78e0e6c7f1f840893d10ce392_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-provisioner@sha256:c0154b1304580446cc9cf83bd9586be09deb93945c9470fd33bb483a8755754e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer-rhel8@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:12a1d960fb650ea5c05f8f532d269ef829fb86644d0db8cad546351ba9600f9e_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:1fb4f8aeccce36de6e9a45eeb15cedd5dabb02d1ab804cd1746bcd9b19b12d47_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:8f52d4372142cc17927ea58df50d914c3a845a0033e16eed9373041d4a5e8d07_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-resizer@sha256:fcfb6de3f0b956021fefe0654d71dd90d5888bb22c9e60f5313859de10d588d9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter-rhel8@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:54e329c1b3b763ea21d66182ee1718738163cfe5604e011d874d1f987a87c394_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:a01c19b41e831ad84e3e0f24b2eaea3330db664a2c08889d9651ca019a8b4e42_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:d7b21ca09b86a27dec8c648f2b3dc2ac932d6707890f34bbf91b2935e1fc0813_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-external-snapshotter@sha256:e3d28d00f8b977c877b87471c61059af348954e76e19926bec2b303f1abd0cdc_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe-rhel8@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:26d1f383be9fd9fc75a8fad221a9f1845dabbfad856bdb820883d36f24346608_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:986616c0ac14cfcd9f4582d410fdfa55623f7033630fa6da2afe9555d27063a8_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:c009feb5952d9be03a99561dc19c9ade778564b683071989f647f8b976e4499a_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-livenessprobe@sha256:cb3178e938b44f647e337a5c4623774499fba209f9886e7809fd7ee2b8b570e2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar-rhel8@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:4d072d9239c961460461e320943b31d97e3c224126c3a5175ffb5d2463224262_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:5da40f03bf9e12b0ea9b29d10cc585c57f632cf1e67d3bd728456e564153ef7c_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:a4456aa052924b7912da52922a28d44db5de5625eaa333a11141e6693a507a7a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-node-driver-registrar@sha256:f1e7f540f1ceb1ba9feb3f58c39eb6d56a7029e83502f2a1c0326d21ffbab5be_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller-rhel8@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:38c967c760173374839567728d1947b3193e1c761781b702b349bf4b0041e85e_s390x", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:3a41797aa859b458883564a54992802949225102ee465bf9a6218da4858b156c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:45bc783acdafd5080ef003c0932bdff8cd6cb7e9b7ffef7e06e18424b246d059_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-controller@sha256:4bf36ece34e62a0d023b40878ff76fc336346628de994a41af91bd63836a8418_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:86159c9c433d44d7fb5cab8fd8a2747662c809021dea71d3ec0ab557dc0cac78_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d0b4964c7565cc5c626e4ff0d5bcbe53b522824ad26db4014e2e62435f91d8d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:d47bca1cb25d6585d8e57d60f7c4108d487faf30bda373fc14cd79ea2392ed5a_arm64", "8Base-RHOSE-4.10:openshift4/ose-csi-snapshot-validation-webhook-rhel8@sha256:e5c751cbf01eeeebc0c68f9e9681aacaeac8fbdb47c064c0176d7ce099c25492_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:5b4d1765ee29e6f2993c7ee4c1946ceaca238f91bd764fef8333fd42845accc9_s390x", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:63894975954b3f322fd784f88a6f678c7607e76a327d3ad348d1b0d5e70fa789_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:7374a21ad412da4af267c303b33d03446771dd5b6e8d3136e9a4e7471ed0eb0e_arm64", "8Base-RHOSE-4.10:openshift4/ose-deployer@sha256:b397d54da93b4512c8a112da0d5aabf39d5ce0bc9dab19c0eb1d4fcbcb662b9b_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:337ca76a55c8cd737ed0f0f319511b7f90600627ef20e8c1cddbda3b9ff51b3a_arm64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:45e9c80b1f8689fbfa3cd8bdd2abdadf95b6a4fde30bcf3a94d0e2a5b971560d_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:aa9449da80675ba7267455d9c96bd2dcff56e8a146fb10cf61ecd050c3463482_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-builder@sha256:b70899af81dc183ca9deacdd39043fc75bceca680610a871ff9b3f101bd21121_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:1666422397ad14fb85ac69ed8dba33577f32f66648df51048ae1b695c19533ca_s390x", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:19f21dceb55061ec4ba344e8e1bc6fac6af19da109916abb355fef9d7d68fe69_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:23b00f320187ff9f5cbfd0cd5c37c017dc30e719e0e79d73356da6112b222408_amd64", "8Base-RHOSE-4.10:openshift4/ose-docker-registry@sha256:b694d7fd8f91f1464a0ff18fa0f6db7242f5a34998f4c0bcc789a8e8b4cae63a_arm64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:37b55f1de19626c7f7507e47515f2ec660e5bd841a51297c1c1a848419c4112d_s390x", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:39ca7d679cadfdcdef09fd1de490de9a730bccbffaddad055517fc54e1c09741_amd64", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5443c04b4ef6fe5bf6e0e32cfb7e1915e78cd0570c2053c556b60e698c9ee5c5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-etcd@sha256:5654f63f47df6251fb9302175e0e6d7f0967efd0ce972aaae9ad705ee3557ac5_arm64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:8850fde5d87d6d816acd36c52c4f8cfd7999486248565985fb6b26b24da0d6f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-cloud-controller-manager-rhel8@sha256:eb09f7888893faad8ef672d4949d0f4929b5e761ab9f6cb114de31ba8e4de92d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:49a061300f65ae689690aa6a43af456e4acb5493786cdfdef09156dd67a5e39c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-operator-rhel8@sha256:4abe7a69f23fe9459a4bb66a597c6aa1d89f69f930d38c5d0ec1955a9ea1c3b4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:0292e1fc71f04b6d9a9e5e622282d7b0299b0ae8c5ea21b25b1474997fb9b85c_amd64", "8Base-RHOSE-4.10:openshift4/ose-gcp-pd-csi-driver-rhel8@sha256:5789c76681c85a1a578f9b973357d66c071b063def8b06cd53c46b2fe8276596_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:1feb052a9830a5010088a3d0690369dcb3e0f56ab71debb40d4e6ed284314304_s390x", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:4827bd644798c865a918e61c17553b6126e482d32c7fb7e1a5d120be7e541efd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:8340958b3eb1d350419e7ee212d11e43ba2d5602cf66ed0d217efaf6951a855e_arm64", "8Base-RHOSE-4.10:openshift4/ose-grafana@sha256:b93b6c4df0254cb35370dde9386949f862e1e2574298c9e71c551c9b9e6a7e8f_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:12e92f1eb76114799b5f31acbe689b3d8e465ed05190c256e061506f5f341d62_amd64", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:3264e42f2ab7d2f8155b00a613ce0c6c33024aec430082bfaac2701428183e11_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:5841e3a748a18e8da5278c4d2dd4c0a5688d424f5b996acedbb20c87fb659b94_s390x", "8Base-RHOSE-4.10:openshift4/ose-haproxy-router@sha256:ab377cad8818a6dc2a4f526cd5a35b6d0eda7d98d2c294f0dd0c3f26c3f15a18_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:6a1a1a3ec502ee5f429a597efa83124e047b5fe7f3c20b058acd16edef4e30f9_s390x", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:769ee3c25e5a8bbf41177edc7af56dffdac79e86e6e7d62a184d4fb5955b47df_amd64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:b4b7f9f8dbcf80c10a472ff5834114cb0c181cdf3fd735174de2183e155e60b7_arm64", "8Base-RHOSE-4.10:openshift4/ose-hyperkube@sha256:c426ecb70512ece1c98f3f6dffcee4dd7068254ea3348c154ac43ddc60cda329_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:3718be2203b13d27c0cfbcc0ef4b8413b837b90c4a26bb87dfcac7b41adba52c_arm64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:483367ef8b7975e468886edcea24613fd0e0640416291d0ac47ebcc9fdbef510_amd64", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:61c88425bc843ea3bee56f5a7dfd393c1c30d048f108113a1dc68f5f52802000_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-hypershift-rhel8@sha256:e843c261272eb3729adee38dfac1ed4cac4a37427ba621dfe34cb191a8d6dc6b_s390x", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:4913018f48a2ee8a97e85c77970a11fa2017197c5a98d6d8b935c88f29e5fa10_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-cloud-controller-manager-rhel8@sha256:7bdd70d78e202b1789beb37bcfcb9fcabf56c6497737fafb6e183ffc44adc138_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:3cd7d0e04167993cd21438d88b3dc674b8a1229612ce4a0884741a596e7a162a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-operator-rhel8@sha256:7344a1b907fd7b163a87fadbbea3571eb62f7864fdf18fd1e52946eadbce20fa_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:818cabd1951391096bccfd7e610f6d05c336c63e277c98f0933d11ca6fff30de_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-block-csi-driver-rhel8@sha256:a0b9c40f487b9debcf3b63dab403e7a926bebb1f1987babd97e2376520780206_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:946c1d58a12ab3d47e4a8e14413f2b72d884dce7031ed92e6fe612091342050d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ibm-vpc-node-label-updater-rhel8@sha256:a9c33f3499ac323390ea6634649dbe8a925cd6a8691e8fef0f811c3741097409_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:29aba2fe8428425b0dbe7dbe4b9542adab0e4f951e697387703f55d767446aee_amd64", "8Base-RHOSE-4.10:openshift4/ose-ibmcloud-machine-controllers-rhel8@sha256:9a6c258f5bccd4299e5c47c85003b3b98a69ad82842edac5f4b05002737c708c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-image-customization-controller-rhel8@sha256:5992a56b34744f86961b865a715d62ba3a071d741ea42f3be684af9ace8e2360_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:3205a8264b78709f3df14de7e79ce6a5ddb35df70a94a8226a8dd75cfe8cdd99_arm64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:8648022584f29b17fa59b5892b97fa58b27e3c4faa02e5ab53c29c3bda10617b_s390x", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:874a14d8a29832de39b1d30e0003a16f6423208141cccf7c58b1b20a38ec5480_amd64", "8Base-RHOSE-4.10:openshift4/ose-insights-rhel8-operator@sha256:d2e6ad3727d72bef20cfddcae7b06a90c1a4946419c328cc1e14d1457c0d9fd3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:05ae5bc9c634c6f7b127622838a6944ed4b7b64c4acb4a6ad3a274b6dc762019_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:4268c24c85f37b19526f74d3169739ac7ee60933b4526e3178a2ba51fb3af34c_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:8912a2308cf466a8690056cf3ac69ef13807545558ef82157fc4715b5d89d6a0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-installer-artifacts@sha256:d4015af5e2aab611fbc26cb21a06c871248126a0920a9106408a74c5133dd5f4_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:2e3eafc0c5a27eac7b2a944a205c9c42dde21485c71a176bb9982d023fe7d360_arm64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:5aa9e7915478ea9254d2dd60a107d8d15f126eba47db5e0bdb2d0b516606e6e3_s390x", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:806ebfc9a28e80142855b4938b8ca8e22dc05b66acb5b00692b2b12aca84a3d1_amd64", "8Base-RHOSE-4.10:openshift4/ose-installer@sha256:da14175f03cec931295bde0471d3affa68563610d5c8220180d250917edf4bc7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ironic-machine-os-downloader-rhel8@sha256:7e202fde4533fa6bbc1aebb18851df836c7a0fbb3569e9cc73c51229be60189c_amd64", "8Base-RHOSE-4.10:openshift4/ose-ironic-rhel8@sha256:9ae175bd01a32a4a1902f2323683364c55f9ef61240833ed90179c9916da9194_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:1ab8ee2b3b6e26912e9651d7c403bac85528ff3b25717195f7f5371f4e173e4a_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:29a228d2e87ac6f86a116c7f916309aa44a6096e2e5396a7b714b479effd412d_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:9ca796806c0c101775bfaf9b4ffdb8c8b731a88656b39a19870089cf0ba231eb_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-base@sha256:bba3e7bd5c3c7c5caa326dae680a60ea85a063cb3c8a6f1f7d542dd0717d9290_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:9608bd8df650af151cc492de07a0dc848f1486d8a9df8fefb124ad882d84b5b5_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:b4b31dcf18dbee6ddb2530bb43998943edfd2206260142892af8f838a376b359_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:c70c7ecae254621869878499acb2b1ff060ed333c7beac56a3de3b0e5793c2c3_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-maven@sha256:cbcf3a658a7264a1d1767b31c358170443023943c6f5466fb0cd60adfbbdf914_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:13d77a6af2d1a729cd347a4cd797f73b43a07c3979313484019503c680b064ac_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:3c0d44cb0f5ac415549877a55573a484076adae457bd2f412d3e8522ba0947bb_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:6489c887172de2a8b43a44df9c6db0df733bc195bf100ce0fc12cb59a6205a1b_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins-agent-nodejs-12-rhel8@sha256:adad8cef129f202266a7c28e222c874d46980d058859cedba91f910e4b179ec2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:0c6609f818aed099c59d1f86faaf181cd2bee128f95322598aaab4a8ab731dbf_s390x", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:824e96a0ea58f654bdd6d1d9fcaffeb8d1303a83129e0733e012d6d42641b887_arm64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:9047993f78a3e1081d738b43f3e90a9d4eb4ca171a9335021d136571b73b0a10_amd64", "8Base-RHOSE-4.10:openshift4/ose-jenkins@sha256:b2d56c915718208d862e3ea3254eaa93aa047ec7b10d6a9cf599f562c2353f92_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:505a9e7dae8cf68370cb7e14a96883d4e79799a0a77d20aace8471f2ee63a9c3_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:c60fd554f2fe37dd5e77be73febba9a249288d68072b72a06412145537fd91bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:cee94fefbb39a407f23c2ccb2427d5dd0857f8f619801b8ccdebde81ac2bf355_arm64", "8Base-RHOSE-4.10:openshift4/ose-k8s-prometheus-adapter@sha256:df57b008c7928ff24daa80629f2644b2bad9914fcc059e98d54985912e6b310f_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:41f50ed4a75f7282d027b861c6810ec6f3097eebc2276a98a752ca1775c779ed_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:7b4070f05334cce40f3dc4789c9cbebe769aa33ba3f4b63a3c8c8a8792d28573_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ac23f71f2c35e2bda36019358cb24da3596be85a676d53a0486e7d14989cf8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-proxy@sha256:b5ee7ec0cfc6ee6bb6be89094ab1757de8b439d41cfe61e2bfec2fb19a9917b2_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2dd8f66672c55c5daa359c4b3d354f08471b80862323715c715e91afce3c7843_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:2ec1c5ef4e2502644b1870235c7f620a8c79cbedb5c136f8b7146e6ab9e3d443_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:936ad08b2ff9b033070ff2c48e26f940c918880625d8fc31eee2e9bbfce1c79f_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-rbac-proxy@sha256:b224ee3992a37d95ee59d051551a8e2a0471a5af7706264fb7aacd2ebfa0410f_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2dbc92634451572beb0c87f58b33c7bd8ea8c96ec3d54f144603852283d22a44_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:2f383820d909c40a50d0e26d62ac8a9712a760b30b65334f4d04e1ae79af93bf_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d3b5c3c113d8bdb3d587800886c733b58bf45dc16acf6be15edb0265f01e2f96_arm64", "8Base-RHOSE-4.10:openshift4/ose-kube-state-metrics@sha256:d96a177d9c9008e48dda7b94e53d40bef3a6dc7e238fc87512d7e197a0b64660_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:1993cf4f3b3a3438f5c8415a12c7e7229b0dda3f4bd8972b88c7c0c2eec6395a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:31c08d0471537cd7ba9f4cdc3fc459fe4170c2937d58dc99ca6f6e18e2960284_amd64", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:a959f8e781c6f8a371ebcd7ec7391202546d63b1d1400021d45a09875b881b41_s390x", "8Base-RHOSE-4.10:openshift4/ose-kube-storage-version-migrator-rhel8@sha256:fea78e631fd3a576060c5177e83d85945128004caebdea8d7833c87dc605ea9a_arm64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:1e1408b9bc76dfcd19dc6824205eef9abbd64440ba7848fa9a720771993a86fc_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-cni-rhel8@sha256:fe4ee248457066858280407cf96fe0a7aa8f09a3452403e2ab818ea52027beff_amd64", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:8afd825d4ae1250a0ebb4a8e5dc38668bdcc8a9c53aaea3490ca0585f6cc03d0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-kuryr-controller-rhel8@sha256:d6e1e33fe5cd8a974d6f257f50cec5f338a7dd4151c1acc744551d5b9ef2f27a_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:17ccae1bf8b9773be193cf4d642345fe765c5092285f6367549d39f7ffce8577_amd64", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:4bf67969e225f54511b3a4f91e9f49dc6bd09e0fca534e21ebc50d6478f453fa_s390x", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:6d62627254f6450f1cd6efa49bd5a65f5fb69acb67da39dd20e65d00503ddc31_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-libvirt-machine-controllers@sha256:c6205e409703060c5740ef24918822b9a3cb195c1b41c9e8776d55835943b4e7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:28974c52848135a454b64a7916d24d675234763893b2a0ab4f816694a9dfdfea_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:599bacd5a1a08fcc0c3c707ef22f6be494da3982d29518e92f70d8ded3190a36_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:ae6ab717b3c20c5d0ec76d232d4ccfb4bc71a73c69511f75466552f919e61765_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-operator@sha256:f0fc8cde0f8a00b27abaf5fa4abe762533f62ca340d54a1f4fe84d2f2fea04bb_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:411f6952127972d777a6da3a6fc5a1d72edff43abf508eb38ebd9cacf4047334_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-aws-rhel8@sha256:e03f0437ef3639beda142236822b18ebe06e6d5ad47f6da1083b1cc85bce11ca_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-azure-rhel8@sha256:3ff5e83914204eb9e3d5bf19fe706f0dcf65bc39f7db6d4532a6fbe3678696a3_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:622113137bb13810335ad64601587b75b1a35a3afcfc24f531f421e8475c3da1_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-gcp-rhel8@sha256:9ce1ea7018f77beb6cddb62f398a15c0fad2c27191f3f1dba2ab623ab2b06b64_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:0d60b8e8fd88602abe1204a9267d8409738328923b4f768f8b0d16f2977393a7_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:4c0e12f3df82b8c583a1d037259a45044920ca2b9346374f9090984a79ae4239_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:831a67187c78f01cf9f73633126699aa4ef83c075ec0b99b77e700ef8477a29e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-api-provider-openstack-rhel8@sha256:ce241e1300288a73317a7cf18359b250f83f57586930bc27893c714d43ca5c35_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:185a320e54426daaf10d4e9f441297c47688067224a72101e5ddd1c54256b72b_arm64", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:53580c73d7f020ada932117064c8eec5f3340db3c506d9586c83356cad8aed43_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:5fc5166ded8aaad4539facd3f645efd70951812d7a316ad0d908fd3557612c8e_s390x", "8Base-RHOSE-4.10:openshift4/ose-machine-config-operator@sha256:a67ad93f1075f1ed9c89860b41f702ef73d3153d1f4615a47b1b45660c94c189_amd64", "8Base-RHOSE-4.10:openshift4/ose-machine-os-images-rhel8@sha256:7b9776aec00f1a45e57482cc6637fd39c2db8eaa205e56999ffa0fd236f9f4f5_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:65b266365adb301e4ca43a96f5037c968e406ed01bc69ddc9c02ba00e84fc2b9_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:75833eb800e0ffc7024e8f278ae7fc5e16c58e0c0165bd7bfba619cc76798869_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:88dc85e9e8be9b9f6681d2a0ed2a5ca346f496f4d26860b8a4baaab6bca2c159_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-admission-controller@sha256:be34dcb8e6936d52707da4d03145da6b61324e73e6107a29441a22b184843a95_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:92c73dbb113fedf83f0ed5d37ffda361b50a43069fc2c99c97594c6c9c1d4a13_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:b03c61b308aea5c22bf1ed56a91e5c29446efacf9f7278c475cbf59fb31f04a4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d2554c66c58f8e02a8c66270f3f7009d37818b9d32666ca3b47e9b5bf3363a27_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-cni@sha256:d9fd1bf09fcb9034584334d53325dee451d7a4be69f754b827fa25a5a6428286_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:5f53439727aa29c79f3d88e749782731c9b0f3dc865da9600472b5ed120a64ed_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:96cf3e9c921c98253a3475dcdde310f847f5444c187f4a6bd2ac7b081d76c792_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:b8a44003a6f2216ab9260249bb06ba2ce15f5f1bd385dbb161007527ab5e22ed_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-networkpolicy-rhel8@sha256:d8f8510b4bf59992bd0fb8bc836bf2ddfe0fc6b9259cb59b095012c4c1e87f2a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:186b99cbf0d6ed46f77c2a1635a5aaaa63dd94bdd000782752dc689c21f34b5b_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:3004986b315f219ff08df423e737572615759208b88a04ed62bf96565f2c99f8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:76bee05e4f5eb3c12cfce50373b2b1de0bc7b6d445f920f37ae66adc87d72f60_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-route-override-cni-rhel8@sha256:8ca8bc05a890d57b04f93361c053b1c5d4ef923187171dfeec630ff3ca743095_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:463b57c38b228346dc4ef9d82bf8f38a8a1e0ecdd6b316dbb7c5f34cda3a471c_amd64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:5d6b871d124d25317a3d27812efe98f5cf0692a97b81c49298255c6f6d8e6f2f_arm64", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:93188d8b6a25381d37191e97d509b785cb48f4abb144ee8e95fd6b2142ebde50_s390x", "8Base-RHOSE-4.10:openshift4/ose-multus-whereabouts-ipam-cni-rhel8@sha256:a45e6a9d3ce6f0cd0d051f547462a2d584c4175c17b1ded3fae4428e36d9d7c4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:1e5446bf24bdac365e1a598bdfb022bbba9d4b4f9dd4f71bf819cc7562023706_s390x", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:347d2a0427701d8f358d53ecc3e6b4e5779af090bbce71577fa019255e7f4a21_amd64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:418741757b88ef52668ca931f4df4c80f99515a06096cec6c8aad683c326ec5d_arm64", "8Base-RHOSE-4.10:openshift4/ose-must-gather@sha256:ce3f5e3a3bcac995613ee0556aa87a3b2f68248d769df2ebc8daf48def75abb4_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:10547e99c4ea93b91704621654e5f137a64481073ee1983f8615b415df485b67_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:3be8b53903ba656844a9d34e4c0160aff593d302efeefed1b9e687755a2841c7_amd64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:91c285005f136dc0336d3d936276eb658ef83224f3bd6ba45574aac35fbf194d_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-interface-bond-cni-rhel8@sha256:d55c90a477e5f2eefbfe9113f57df6ab238af00c52ea05a918f8decfdabe8f4d_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:86ec7e00aa4327601f4c9d9d24c9a05a7ab0f60e3b739821c8018924595a8126_s390x", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:a6e9da723cf9b6f53ef971a9164b9ae5c6c276d86c6541917a8345c5fa496f5c_arm64", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:b25335732ca8f28eef91975cce4cb99cd94224c425daa39487ddfe499603644f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-network-metrics-daemon-rhel8@sha256:dddab9cc54ccd00e3da71c06e1e41af6a93cfb8a826287f02df1f6fab0b9fef1_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:04ac554a9ee95a78718dfc56b9f7f165598ef03d977fc9aa298fe858ccc5eb79_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:2e72214c7d6699dd87a9ebc35ac54e396553b68f9940375d35211f6955d6a63c_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:8ec9705ae362c230d942fde023316026374a847570de7dcc81d16cdb3ca5ad6e_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-apiserver-rhel8@sha256:b60a4828551e85bd1aa79a643adf28136f3d78d5c42fb79f8a879c39f4fd6860_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:2aed551f95f1b90c3d9c33c8a9e016f07f35f6bfd486dbbe58c23a21d5726738_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:5fe23253a845e1a0a4643107446195ee85720241fbb5063c13e6de324aeabf26_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:a19a82795f596413e6369154e399e4769c74ad10b8b8eb4fb20b3a6281a8137a_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-proxy@sha256:fd810dce5f7477ae5ace26245b3f934c99da62735b6b55d82d3f5321e2e8c1f3_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:11aef38e5bfbf04f8a7d9bb7737b5c8f589f61da97bd703f66011e3558634868_s390x", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:72d0d75f4aae77b84500573c4021a72ec13852ee592108cce1c11c5667bd7307_amd64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:835fa6a874242178708227f4e135fc6e9a1bff7c24c78fbdfdedbed5ab0bd9fd_arm64", "8Base-RHOSE-4.10:openshift4/ose-oauth-server-rhel8@sha256:9ede08f9c60c5c5b03472e242b0fc3af70bc72957ef0fa726a6d21f0f8fe23ca_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:54e023e1286a51dad3dd5b5e2c3c28e924251a7c3f47981b6d1f4b77ae25fa8a_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:abfa691bf70d8c76ea1cd419b668614968ddb222d3a30d0dab3586774d0a8620_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:cd5c7ab09b61a2ef1541ba30fb8ee3c8b8933201628c2b37f67913317b914715_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-apiserver-rhel8@sha256:f94c0039c4f9d1cf0d3efd748455dd941227f99b6a255320d4396aa28ec5edba_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:3450268f977d5d522ca88eafc6ec245a591b6a43050b6401e411ddc6f11b17d7_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:ae621a71051d4537893eb30b67a7f74fb5349691f6f1f6141150fb18491a7e53_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bb5d2f27c76b758f4981aeb3fcb5853a5b4d8b6dd85cd9d227e5d1851c484d80_amd64", "8Base-RHOSE-4.10:openshift4/ose-openshift-controller-manager-rhel8@sha256:bcbab4b3a0e6e400c6176d3d4b6a1f6550907453f337a3649e340b999176a4e9_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:6d9318d8137552fb2fde8b5c406d018bb698eb8bc77954275c7c374cdb0e06db_arm64", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:a0a2988c2535f4d3e111361ca2c853734be06422f1e42ffbfa3009c801a5cfd0_s390x", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:c4d167e89bd3cd914757f42313cfaed0789181d6149e985b898ba86b14a2b1ea_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openshift-state-metrics-rhel8@sha256:e55391a04cb70487b88eb125a3fcbcddbc32ccd089b36ab99f439200b6c0b7fd_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:8ec0ccd393ced89e29ac68a00a14ef0817f69c6f851f6e88139a80895d8ecdb5_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:d627513c17538d6b5f5a22b809678d5a168ad8e2b74a631ab277e153409cacd2_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:e3a00a045dd6172245d9db074b4accbb6a5fb13755728bbcea01ef77648b3dde_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8-operator@sha256:eb66748477f22f546bff68ceb36ff92db6ab324ca8b726b36438efa3ab8c8166_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:0bdc85ab1d586f99731e10b0f7373d188e6365daddec5afd4ab57f122422bfd8_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:24058e73346dab396721ae91a4210d184aba1ef92f65ee183874fc5322c98776_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:9d9dc833d426850eb49743607c30dfeb7768351f87c26097f54f5aa053b5d5aa_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cinder-csi-driver-rhel8@sha256:c3699124ee220a202ddaa7a2e9734b4e66ffa01ecaae4afb8b239577bf4b98e2_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:116d26566afd2475910242e56760cb0fb817f6beb0df126fe473fa3a33bbe694_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:919428283a58336d4567cff7f7bd50ab536fd214dac916ea29717e27ab0fe137_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:cc0a564aa8fb6890ab46f62b8ca04185111d03c0b32d79f5460970b5e5667059_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-cloud-controller-manager-rhel8@sha256:e2badac83fc4bc8ddf458eb3a4ebf0aec25c86f52d068b81539e7e1efacaa233_s390x", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:35d4a88fe1d6a8b27bb7ce47c6a0ccd3069313c773541f289e27563322a71557_arm64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:878b7abab00dfff51a2eb36afe855928887bfd11b056095281181387b488fcb9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d3f8e3ee54bdc831efad4b90684428637064d47c7eaf1801ed8955c8cb17ae33_amd64", "8Base-RHOSE-4.10:openshift4/ose-openstack-machine-controllers@sha256:d49bb3999665528bb722ba50adad7e132c1f14d68802e7fae1059b600574f5e6_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:02dfa7ba8446c355d33d3d71c5f98f49905e2c6ea36db456a124e40086951f28_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:8bdfc43aefe5e0fab4f4ad2ab9ac14b530ab12edd5bc78d7acb7f43e6727a6de_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:9bad4067a7fe988eae00e11a4d87af55c898bb0d5d69b9e73f5a7832f0b3f14f_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-lifecycle-manager@sha256:d832488cf1d7bdcba8bc9117d61f22f839b0a97d20048eeaa6cd6fd1eeb16b8d_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:05359b7664766266c1c796a188cbef6a57f7c251bf41f681f3139c32c931d694_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:1bde1261afb6754a232f8462df4ea8f9748fd94e0aab381e2eabbb0cf1430d0f_arm64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:74fc56beee81bf3e7b03c081c8784c01fd8702c52e05641f1cf718754a2f6f9a_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-marketplace@sha256:b301a492350d5eee9d439e8ef2716d7d0283250455676361271d55f87e026690_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:0d5e522c3f6f9e31aed8e899d4dd3be62005d380811367b67b0e8703b9127c4b_s390x", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ad3d36357a5b59d300cfe1a087b4c7822b17e65ff985a82b9a9dd9d92c1009a_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:1ea924dbdba72aca6e34d3c2a438a9695cf25ca7e654f69eac2afc7769a3d0a6_amd64", "8Base-RHOSE-4.10:openshift4/ose-operator-registry@sha256:57d7daf862f418fe7c6451b211af37f3ee09b2c951c7ac3af0c47533dcb190c2_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:473a539060a52bea265a45f4c540d6cca3dc5261fd5dc4c383e1898e97e7dc31_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:5ce5df4619a0f99c89e45a22c1d84f53e81daa75f28a195402e993af31df0625_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:d0ae7fd78ff83c15ea8b7eb527b476f79ac8e544c16f5ddbcbf8f8707c02389c_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovirt-machine-controllers-rhel8@sha256:f690b2f381b7d5583104172aa22d9ee0f5b873e57daba78226fa7e4207cba838_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:6c81becb17340afe7ec963517f03e474867596ad00f44897743b251b2faedd12_amd64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:c9dd717cce726e52b382a4758a5268efd55b8bdb56c7e5b5d1446a85d0753d65_arm64", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f6da10029e3e2b519959dcd5b204a6bf5febbc192b8ae4e92da26ea9d2d363f5_s390x", "8Base-RHOSE-4.10:openshift4/ose-ovn-kubernetes@sha256:f7dc48bee87397a51cdcc5c7948d61fd929ef4e94e57c6d5035ce4a845d67c2f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:1048d87e6c03fb6ff5e94bdc7336b32f346babb2e640364757ab0e5b5eb9f2a1_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:43746dcda03a1275af7dad7d4881d4a394edd32a9f7170bebbe55e8b849762e6_arm64", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c0a7af4d0879baa98c07e73cd47948a8cf5a799e64e8f705f86e065f9c6d9dcf_s390x", "8Base-RHOSE-4.10:openshift4/ose-pod@sha256:c132dc6bcbb7e691e77a8c987775de77616b83cb89d369c0cd4988562ae35fe9_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:7806c888b91306c0efc68f6fb430e71d175b83ce347f678dbacf9b57158c7bca_amd64", "8Base-RHOSE-4.10:openshift4/ose-powervs-machine-controllers-rhel8@sha256:914865f6bed240566b1bcfdf7bb755196e7353abd76c0424863f62814434656c_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:0f93a065c98a7c68d7f0b7c35383a90e755e2c3c9aae7e901262588dc89d1303_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:63cd4af6890633dede1cc86639e0adaf9b0addd3e11aa9c7aec536d145dec7fc_amd64", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:7884f5befcea89cae3b551baf920c9123625a90dae73fadbac204cf0551f7564_s390x", "8Base-RHOSE-4.10:openshift4/ose-prom-label-proxy@sha256:82eb26806c9a6fde555f5bc1b258ac943b1449f3b61d294aa790daf408cfe6f9_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:0f8910148f5b041d68a43f57626978cba089ea0cff36be8319be876c0100f720_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:5de5c6a2fe493d754c6e6db92ca36fba43e6e322bcb65d160a180b8c06589b98_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:a4c3d094f43b0691d0044531b507852dc01a5b057ee8f92dc03b8cc2161943e0_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-alertmanager@sha256:efcee0674be16f131ca5e28b9b1be17d6bf70a7a8a3c428ea2c47282e432d1bd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:6f2b853e3316575f65c4fd27eab2c716602355d89c404477dcbcfdf798d237a5_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:72e6189ac501241792cb36d73337d137a106a92f6fbdfd3be6db4ea5748535dd_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:ca81e544bba9228b5ee0cd4ddee733e1664845ec7cf2160106a4558e522bf58e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-config-reloader@sha256:e07594e2b51911327730a4b5ad79283894d16f2b8b57092c81821a789afa845e_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:0c0ee7265537a45684090ab131278bbee14c643984ab11bb82825a43110ba0c9_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:6d5e64a3b72fea46157d33ea596a9cf115059a8d4506eefc19b9a9bc4fd85dfb_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:738357581bbe3d86156fc34a2ec4e5a9065486114c7479c72cff6003cea75a35_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus-node-exporter@sha256:fde28fa5bc4868cd17bae2ff7d787ec5ed61d058a5bea22158c4b0efe7444a4e_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:05af0d1d94662899b3d985c58adc0b6187e1157a4a0fb9b47ed931b7c46c2788_amd64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:2a9004f35a12aa08ecf73096ee2e76a90d7065cbe792873f11f469cf94be08c0_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:622a3c9b50a972f2f0216e6dbc40ed6918818564bc1bb4fbd473700e4387eff5_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus-operator@sha256:a617b1fbd71b9af4aec8ce04ad4aa5983f127fb0f4147a52222bd92d57d29731_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:1ba1e6065e057ea7950f7b6620a8082f3bc86cfad087587e25f1ffc2b304041a_s390x", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:a41b83760fc1762f76d82f2e2a66d92a8ab05e101ee47626896389d2e23354ad_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:b89ca5bb813f35da2f40c3736f19656c17eb78c13c8e26baf0a2ebb61f3a21f0_arm64", "8Base-RHOSE-4.10:openshift4/ose-prometheus@sha256:cd956a29721b1d15b054f1da5ea640360e7b0895711eff6f5c3e22252bb998e6_amd64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c545bc02bcdac9654f88cf599e803dbc42b3d7d714c106f7e1e838c80f9d2f03_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:c7520134ab854972ce2460ae7d5a64413fe1ea04d5419ab7e92e3f1f91e017a9_arm64", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:d0a7e0fb3c33fb616f33209a862d19499680bccf8e7e1cfa272ea95565a39174_s390x", "8Base-RHOSE-4.10:openshift4/ose-sdn-rhel8@sha256:e560b35e965f84cb550f774401533da617ba9d51f08e7875e8a2fbe6e5eb7098_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:87d298c2daa6e94d92a8be10bae8e3659cc570f8b4d2c0f5e7bed8eab6bc8ab9_arm64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:a39453ee3491e5c6a7656c5cd830eadd753afef5001e4527c8bbd36d9ba5ef4b_amd64", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:edb8200e52e699482d37ba7038037a290153cc2554a85217efc74c731cf5d091_s390x", "8Base-RHOSE-4.10:openshift4/ose-service-ca-operator@sha256:f8c5e0951625ddebf47e4f33c23ba0280ebc9130e0e232c2aad3f62cc682db46_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:1246fdb9aae72a4e8062dce0082fccdcaf34ec2791c6cc014924876eaa811f68_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:5ca3dd9d9d8893c96c92f50d812849e0133747f7601e26eb785ad15ad08f8b48_arm64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:f78f6e1cf28b0711d3b34cea7798f5c58b122f6bf35214b115a0b6360ed510f0_amd64", "8Base-RHOSE-4.10:openshift4/ose-telemeter@sha256:fc8f82223dadb0ef094c3f3f00a9ccc94684cb56ea022fbfe3a51685db100a61_s390x", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:4083c90b89a9458f407fd18da674cba452e33516bd4e04fd116e6ec94c3fb7ef_amd64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:5f906483d8b8460dabe78be98c27f38a97c10827f1acf59915479eda9bf34e8f_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:6a05301cbba45c8d43dd6bcbc173c996765c1c7dca599a993c96a8a50b5aa225_arm64", "8Base-RHOSE-4.10:openshift4/ose-tests@sha256:d3f1de200cc3caf5a799185e357f0eb888df5bf45cb43a695a453d4b1c355027_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:0f4f6e9a015752101aadd17e327c7e9de8d9e4b81a9477a052b2590737e74ea1_amd64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:13dd3c9fc5b5dff7e3e1079c8b4e45b9cc693ed34d2eedf94b59c4457a57ffae_s390x", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:747dc80e67edd88fca26074938c56378b740302f4778870004b80650f8987f2d_arm64", "8Base-RHOSE-4.10:openshift4/ose-thanos-rhel8@sha256:f06ecf0b33955aedad06f39ef880cb86410103089d8a04b42a58b21add22771b_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:35cdaca4049fcb61e5a70e638e41e7f3fd23052323071228bc5897f5afa247f4_arm64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:596f5a07ac4793b063946c53f8e88a2fbdddb799f3a7138f45900be876f19171_amd64", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:6d961cfa05514fbfa8f99324f105365f83f2d21471e3085d3a3c5efde8e730ad_s390x", "8Base-RHOSE-4.10:openshift4/ose-tools-rhel8@sha256:b1b3f8bb78313ff5fe9268135711fd17c8047ec9333ba4c67cd4d7db9024dd4e_ppc64le", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vmware-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-cloud-controller-manager-rhel8@sha256:f8e246421ead3f4fae0892731b18ff62cdfd5e3f3c9f8612409b7f9c1f87f8d2_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-operator-rhel8@sha256:b0e93d5d85fa5d8ec1c7eccf53dbdc5ff2172480830ff0f6f4386a3e95e8a146_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-rhel8@sha256:e2e6b63952cd218e4af10563db7bef3038dcf30517687d464dc74770dbd18aaa_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-csi-driver-syncer-rhel8@sha256:9723128fdaa7808704bc612d67ac9e828110ce7b5476db886561e34c3b97e210_amd64", "8Base-RHOSE-4.10:openshift4/ose-vsphere-problem-detector-rhel8@sha256:8c347b1304618ff4b33cae77bb084bc105c4957a2a2c0711273f24a4cd629149_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel7@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:267f9fa94d98636bc7b25e69998a11b14e9294e859d5b36c660b04c29173536d_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:534f26985e3a8aea0786bef87de5680a6f268b9e9719e8f2a6b79cd678350dcb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:a5ead7ff6925fe310fe03bfabf17bddc450a61ea52d2aee68574ca0842c2e1f2_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8-operator@sha256:e416f029b5d7c42761203b186309dab79d21727aa973ef7757feff0a02d6716f_ppc64le", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:40f2a94ee49a2630186bf92734069791b91eba565f07f54ef8f752e2002b1cc5_amd64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:806a19627666a0cafca09906083322064acb1de4eacddf87006546f19f5513fb_arm64", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:993bbfe5e63cc02310bc6567757701825bb996ce1bf63c62cb2565e93a9511e1_s390x", "8Base-RHOSE-4.10:openshift4/ovirt-csi-driver-rhel8@sha256:a97473143895fabf78cbe6ca939c5ee92d1636135616e33d447818e4c21b6457_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" } ] }
rhsa-2022_6526
Vulnerability from csaf_redhat
Published
2022-09-14 19:28
Modified
2024-12-17 22:03
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
This advisory contains the following OpenShift Virtualization 4.11.0 images:
RHEL-8-CNV-4.11
===============
hostpath-provisioner-container-v4.11.0-21
kubevirt-tekton-tasks-operator-container-v4.11.0-29
kubevirt-template-validator-container-v4.11.0-17
bridge-marker-container-v4.11.0-26
hostpath-csi-driver-container-v4.11.0-21
cluster-network-addons-operator-container-v4.11.0-26
ovs-cni-marker-container-v4.11.0-26
virtio-win-container-v4.11.0-16
ovs-cni-plugin-container-v4.11.0-26
kubemacpool-container-v4.11.0-26
hostpath-provisioner-operator-container-v4.11.0-24
cnv-containernetworking-plugins-container-v4.11.0-26
kubevirt-ssp-operator-container-v4.11.0-54
virt-cdi-uploadserver-container-v4.11.0-59
virt-cdi-cloner-container-v4.11.0-59
virt-cdi-operator-container-v4.11.0-59
virt-cdi-importer-container-v4.11.0-59
virt-cdi-uploadproxy-container-v4.11.0-59
virt-cdi-controller-container-v4.11.0-59
virt-cdi-apiserver-container-v4.11.0-59
kubevirt-tekton-tasks-modify-vm-template-container-v4.11.0-7
kubevirt-tekton-tasks-create-vm-from-template-container-v4.11.0-7
kubevirt-tekton-tasks-copy-template-container-v4.11.0-7
checkup-framework-container-v4.11.0-67
kubevirt-tekton-tasks-cleanup-vm-container-v4.11.0-7
kubevirt-tekton-tasks-disk-virt-sysprep-container-v4.11.0-7
kubevirt-tekton-tasks-wait-for-vmi-status-container-v4.11.0-7
kubevirt-tekton-tasks-disk-virt-customize-container-v4.11.0-7
vm-network-latency-checkup-container-v4.11.0-67
kubevirt-tekton-tasks-create-datavolume-container-v4.11.0-7
hyperconverged-cluster-webhook-container-v4.11.0-95
cnv-must-gather-container-v4.11.0-62
hyperconverged-cluster-operator-container-v4.11.0-95
kubevirt-console-plugin-container-v4.11.0-83
virt-controller-container-v4.11.0-105
virt-handler-container-v4.11.0-105
virt-operator-container-v4.11.0-105
virt-launcher-container-v4.11.0-105
virt-artifacts-server-container-v4.11.0-105
virt-api-container-v4.11.0-105
libguestfs-tools-container-v4.11.0-105
hco-bundle-registry-container-v4.11.0-587
Security Fix(es):
* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)
* kubeVirt: Arbitrary file read on the host from KubeVirt VMs (CVE-2022-1798)
* golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561)
* golang: syscall: don't close fd 0 on ForkExec error (CVE-2021-44717)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.11.0 images:\n\nRHEL-8-CNV-4.11\n===============\nhostpath-provisioner-container-v4.11.0-21\nkubevirt-tekton-tasks-operator-container-v4.11.0-29\nkubevirt-template-validator-container-v4.11.0-17\nbridge-marker-container-v4.11.0-26\nhostpath-csi-driver-container-v4.11.0-21\ncluster-network-addons-operator-container-v4.11.0-26\novs-cni-marker-container-v4.11.0-26\nvirtio-win-container-v4.11.0-16\novs-cni-plugin-container-v4.11.0-26\nkubemacpool-container-v4.11.0-26\nhostpath-provisioner-operator-container-v4.11.0-24\ncnv-containernetworking-plugins-container-v4.11.0-26\nkubevirt-ssp-operator-container-v4.11.0-54\nvirt-cdi-uploadserver-container-v4.11.0-59\nvirt-cdi-cloner-container-v4.11.0-59\nvirt-cdi-operator-container-v4.11.0-59\nvirt-cdi-importer-container-v4.11.0-59\nvirt-cdi-uploadproxy-container-v4.11.0-59\nvirt-cdi-controller-container-v4.11.0-59\nvirt-cdi-apiserver-container-v4.11.0-59\nkubevirt-tekton-tasks-modify-vm-template-container-v4.11.0-7\nkubevirt-tekton-tasks-create-vm-from-template-container-v4.11.0-7\nkubevirt-tekton-tasks-copy-template-container-v4.11.0-7\ncheckup-framework-container-v4.11.0-67\nkubevirt-tekton-tasks-cleanup-vm-container-v4.11.0-7\nkubevirt-tekton-tasks-disk-virt-sysprep-container-v4.11.0-7\nkubevirt-tekton-tasks-wait-for-vmi-status-container-v4.11.0-7\nkubevirt-tekton-tasks-disk-virt-customize-container-v4.11.0-7\nvm-network-latency-checkup-container-v4.11.0-67\nkubevirt-tekton-tasks-create-datavolume-container-v4.11.0-7\nhyperconverged-cluster-webhook-container-v4.11.0-95\ncnv-must-gather-container-v4.11.0-62\nhyperconverged-cluster-operator-container-v4.11.0-95\nkubevirt-console-plugin-container-v4.11.0-83\nvirt-controller-container-v4.11.0-105\nvirt-handler-container-v4.11.0-105\nvirt-operator-container-v4.11.0-105\nvirt-launcher-container-v4.11.0-105\nvirt-artifacts-server-container-v4.11.0-105\nvirt-api-container-v4.11.0-105\nlibguestfs-tools-container-v4.11.0-105\nhco-bundle-registry-container-v4.11.0-587\n\nSecurity Fix(es):\n\n* golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716)\n\n* kubeVirt: Arbitrary file read on the host from KubeVirt VMs (CVE-2022-1798)\n\n* golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561)\n\n* golang: syscall: don\u0027t close fd 0 on ForkExec error (CVE-2021-44717)\n\n* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)\n\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n\n* golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6526", "url": "https://access.redhat.com/errata/RHSA-2022:6526" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1937609", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937609" }, { "category": "external", "summary": "1945593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945593" }, { "category": "external", "summary": "1968514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1968514" }, { "category": "external", "summary": "1993109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1993109" }, { "category": "external", "summary": "1994604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994604" }, { "category": "external", "summary": "2001385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001385" }, { "category": "external", "summary": "2009793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009793" }, { "category": "external", "summary": "2010318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010318" }, { "category": "external", "summary": "2025276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025276" }, { "category": "external", "summary": "2025401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025401" }, { "category": "external", "summary": "2026357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026357" }, { "category": "external", "summary": "2029349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029349" }, { "category": "external", "summary": "2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "2031857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031857" }, { "category": "external", "summary": "2033077", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033077" }, { "category": "external", "summary": "2035344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035344" }, { "category": "external", "summary": "2036676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036676" }, { "category": "external", "summary": "2039976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039976" }, { "category": "external", "summary": "2040766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040766" }, { "category": "external", "summary": "2041467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041467" }, { "category": "external", "summary": "2042402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042402" }, { "category": "external", "summary": "2042809", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042809" }, { "category": "external", "summary": "2045086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045086" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2047186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047186" }, { "category": "external", "summary": "2051899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2051899" }, { "category": "external", "summary": "2052094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052094" }, { "category": "external", "summary": "2052466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052466" }, { "category": "external", "summary": "2052689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052689" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "2056467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056467" }, { "category": "external", "summary": "2057157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057157" }, { "category": "external", "summary": "2057310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2057310" }, { "category": "external", "summary": "2058149", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058149" }, { "category": "external", "summary": "2058925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058925" }, { "category": "external", "summary": "2059121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2059121" }, { "category": "external", "summary": "2060485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060485" }, { "category": "external", "summary": "2060585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060585" }, { "category": "external", "summary": "2061208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061208" }, { "category": "external", "summary": "2061723", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061723" }, { "category": "external", "summary": "2063540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063540" }, { "category": "external", "summary": "2063792", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063792" }, { "category": "external", "summary": "2064034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064034" }, { "category": "external", "summary": "2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2064936", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064936" }, { "category": "external", "summary": "2065014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065014" }, { "category": "external", "summary": "2065019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2065019" }, { "category": "external", "summary": "2066768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066768" }, { "category": "external", "summary": "2067246", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067246" }, { "category": "external", "summary": "2069287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069287" }, { "category": "external", "summary": "2069388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069388" }, { "category": "external", "summary": "2070366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070366" }, { "category": "external", "summary": "2070864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070864" }, { "category": "external", "summary": "2071488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071488" }, { "category": "external", "summary": "2071549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071549" }, { "category": "external", "summary": "2071611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071611" }, { "category": "external", "summary": "2071921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2071921" }, { "category": "external", "summary": "2073669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073669" }, { "category": "external", "summary": "2073679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073679" }, { "category": "external", "summary": "2073982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073982" }, { "category": "external", "summary": "2074337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074337" }, { "category": "external", "summary": "2075200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075200" }, { "category": "external", "summary": "2075409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075409" }, { "category": "external", "summary": "2076292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076292" }, { "category": "external", "summary": "2076379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076379" }, { "category": "external", "summary": "2076790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076790" }, { "category": "external", "summary": "2076908", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076908" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2078700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078700" }, { "category": "external", "summary": "2078703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078703" }, { "category": "external", "summary": "2078709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078709" }, { "category": "external", "summary": "2078728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2078728" }, { "category": "external", "summary": "2079366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079366" }, { "category": "external", "summary": "2079674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079674" }, { "category": "external", "summary": "2079783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2079783" }, { "category": "external", "summary": "2080132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080132" }, { "category": "external", "summary": "2080155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080155" }, { "category": "external", "summary": "2080547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080547" }, { "category": "external", "summary": "2080833", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080833" }, { "category": "external", "summary": "2080835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080835" }, { "category": "external", "summary": "2081182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081182" }, { "category": "external", "summary": "2081202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081202" }, { "category": "external", "summary": "2081409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081409" }, { "category": "external", "summary": "2081671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081671" }, { "category": "external", "summary": "2081831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081831" }, { "category": "external", "summary": "2082008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082008" }, { "category": "external", "summary": "2082164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082164" }, { "category": "external", "summary": "2082912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082912" }, { "category": "external", "summary": "2083093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083093" }, { "category": "external", "summary": "2083097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083097" }, { "category": "external", "summary": "2083100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083100" }, { "category": "external", "summary": "2083101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083101" }, { "category": "external", "summary": "2083135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083135" }, { "category": "external", "summary": "2083256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083256" }, { "category": "external", "summary": "2083595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2083595" }, { "category": "external", "summary": "2084102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084102" }, { "category": "external", "summary": "2084122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084122" }, { "category": "external", "summary": "2084418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084418" }, { "category": "external", "summary": "2084431", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084431" }, { "category": "external", "summary": "2084476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084476" }, { "category": "external", "summary": "2084532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084532" }, { "category": "external", "summary": "2084610", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084610" }, { "category": "external", "summary": "2085320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085320" }, { "category": "external", "summary": "2085322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2085322" }, { "category": "external", "summary": "2086272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086272" }, { "category": "external", "summary": "2086278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086278" }, { "category": "external", "summary": "2086281", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086281" }, { "category": "external", "summary": "2086286", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086286" }, { "category": "external", "summary": "2086293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086293" }, { "category": "external", "summary": "2086294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086294" }, { "category": "external", "summary": "2086303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086303" }, { "category": "external", "summary": "2086479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086479" }, { "category": "external", "summary": "2086486", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086486" }, { "category": "external", "summary": "2086488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086488" }, { "category": "external", "summary": "2086769", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086769" }, { "category": "external", "summary": "2086803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086803" }, { "category": "external", "summary": "2086825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086825" }, { "category": "external", "summary": "2086849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2086849" }, { "category": "external", "summary": "2087188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087188" }, { "category": "external", "summary": "2087189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087189" }, { "category": "external", "summary": "2087232", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087232" }, { "category": "external", "summary": "2087546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087546" }, { "category": "external", "summary": "2087547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087547" }, { "category": "external", "summary": "2087559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087559" }, { "category": "external", "summary": "2087566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087566" }, { "category": "external", "summary": "2087570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087570" }, { "category": "external", "summary": "2087577", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087577" }, { "category": "external", "summary": "2087578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087578" }, { "category": "external", "summary": "2087582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087582" }, { "category": "external", "summary": "2087583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087583" }, { "category": "external", "summary": "2087584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087584" }, { "category": "external", "summary": "2087587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087587" }, { "category": "external", "summary": "2087589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087589" }, { "category": "external", "summary": "2087590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087590" }, { "category": "external", "summary": "2087593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087593" }, { "category": "external", "summary": "2087603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087603" }, { "category": "external", "summary": "2087616", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087616" }, { "category": "external", "summary": "2087701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087701" }, { "category": "external", "summary": "2087717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087717" }, { "category": "external", "summary": "2088034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088034" }, { "category": "external", "summary": "2088355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088355" }, { "category": "external", "summary": "2088361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088361" }, { "category": "external", "summary": "2088379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088379" }, { "category": "external", "summary": "2088407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088407" }, { "category": "external", "summary": "2088471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088471" }, { "category": "external", "summary": "2088472", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088472" }, { "category": "external", "summary": "2088477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088477" }, { "category": "external", "summary": "2088849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088849" }, { "category": "external", "summary": "2089078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089078" }, { "category": "external", "summary": "2089271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089271" }, { "category": "external", "summary": "2089327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089327" }, { "category": "external", "summary": "2089376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089376" }, { "category": "external", "summary": "2089477", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089477" }, { "category": "external", "summary": "2089700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089700" }, { "category": "external", "summary": "2089745", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089745" }, { "category": "external", "summary": "2089789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089789" }, { "category": "external", "summary": "2089825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089825" }, { "category": "external", "summary": "2089836", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089836" }, { "category": "external", "summary": "2089840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089840" }, { "category": "external", "summary": "2089877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089877" }, { "category": "external", "summary": "2089932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089932" }, { "category": "external", "summary": "2089942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089942" }, { "category": "external", "summary": "2089954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089954" }, { "category": "external", "summary": "2089963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089963" }, { "category": "external", "summary": "2089967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089967" }, { "category": "external", "summary": "2089970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089970" }, { "category": "external", "summary": "2089972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089972" }, { "category": "external", "summary": "2089979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089979" }, { "category": "external", "summary": "2089982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089982" }, { "category": "external", "summary": "2090035", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090035" }, { "category": "external", "summary": "2090036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090036" }, { "category": "external", "summary": "2090037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090037" }, { "category": "external", "summary": "2090038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090038" }, { "category": "external", "summary": "2090042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090042" }, { "category": "external", "summary": "2090043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090043" }, { "category": "external", "summary": "2090046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090046" }, { "category": "external", "summary": "2090048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090048" }, { "category": "external", "summary": "2090054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090054" }, { "category": "external", "summary": "2090055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090055" }, { "category": "external", "summary": "2090056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090056" }, { "category": "external", "summary": "2090057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090057" }, { "category": "external", "summary": "2090059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090059" }, { "category": "external", "summary": "2090064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090064" }, { "category": "external", "summary": "2090066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090066" }, { "category": "external", "summary": "2090068", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090068" }, { "category": "external", "summary": "2090131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090131" }, { "category": "external", "summary": "2090350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2090350" }, { "category": "external", "summary": "2091003", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091003" }, { "category": "external", "summary": "2091058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091058" }, { "category": "external", "summary": "2091309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091309" }, { "category": "external", "summary": "2091406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091406" }, { "category": "external", "summary": "2091754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091754" }, { "category": "external", "summary": "2091755", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091755" }, { "category": "external", "summary": "2091756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091756" }, { "category": "external", "summary": "2091758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091758" }, { "category": "external", "summary": "2091760", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091760" }, { "category": "external", "summary": "2091761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091761" }, { "category": "external", "summary": "2091762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091762" }, { "category": "external", "summary": "2091764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091764" }, { "category": "external", "summary": "2091765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091765" }, { "category": "external", "summary": "2091766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091766" }, { "category": "external", "summary": "2091853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091853" }, { "category": "external", "summary": "2091863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091863" }, { "category": "external", "summary": "2091868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091868" }, { "category": "external", "summary": "2091889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091889" }, { "category": "external", "summary": "2091897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091897" }, { "category": "external", "summary": "2091904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091904" }, { "category": "external", "summary": "2091911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091911" }, { "category": "external", "summary": "2091940", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091940" }, { "category": "external", "summary": "2091945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091945" }, { "category": "external", "summary": "2091946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091946" }, { "category": "external", "summary": "2091982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091982" }, { "category": "external", "summary": "2092048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092048" }, { "category": "external", "summary": "2092052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092052" }, { "category": "external", "summary": "2092071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092071" }, { "category": "external", "summary": "2092079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092079" }, { "category": "external", "summary": "2092158", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092158" }, { "category": "external", "summary": "2092228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092228" }, { "category": "external", "summary": "2092230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092230" }, { "category": "external", "summary": "2092306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092306" }, { "category": "external", "summary": "2092337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092337" }, { "category": "external", "summary": "2092359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092359" }, { "category": "external", "summary": "2092654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092654" }, { "category": "external", "summary": "2092662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092662" }, { "category": "external", "summary": "2092663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092663" }, { "category": "external", "summary": "2092664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092664" }, { "category": "external", "summary": "2092781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092781" }, { "category": "external", "summary": "2092783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092783" }, { "category": "external", "summary": "2092787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092787" }, { "category": "external", "summary": "2092789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092789" }, { "category": "external", "summary": "2092951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092951" }, { "category": "external", "summary": "2093282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093282" }, { "category": "external", "summary": "2093691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093691" }, { "category": "external", "summary": "2093713", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093713" }, { "category": "external", "summary": "2093715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093715" }, { "category": "external", "summary": "2093716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093716" }, { "category": "external", "summary": "2093772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093772" }, { "category": "external", "summary": "2093773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093773" }, { "category": "external", "summary": "2093866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093866" }, { "category": "external", "summary": "2093867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093867" }, { "category": "external", "summary": "2094202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094202" }, { "category": "external", "summary": "2094207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094207" }, { "category": "external", "summary": "2094208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094208" }, { "category": "external", "summary": "2094217", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094217" }, { "category": "external", "summary": "2094222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094222" }, { "category": "external", "summary": "2094323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094323" }, { "category": "external", "summary": "2094405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094405" }, { "category": "external", "summary": "2094440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094440" }, { "category": "external", "summary": "2094451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094451" }, { "category": "external", "summary": "2094453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094453" }, { "category": "external", "summary": "2094465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094465" }, { "category": "external", "summary": "2094471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094471" }, { "category": "external", "summary": "2094481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094481" }, { "category": "external", "summary": "2094486", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094486" }, { "category": "external", "summary": "2094491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094491" }, { "category": "external", "summary": "2094495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094495" }, { "category": "external", "summary": "2094646", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094646" }, { "category": "external", "summary": "2094665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094665" }, { "category": "external", "summary": "2094678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094678" }, { "category": "external", "summary": "2094727", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094727" }, { "category": "external", "summary": "2094807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094807" }, { "category": "external", "summary": "2094813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094813" }, { "category": "external", "summary": "2094848", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2094848" }, { "category": "external", "summary": "2095125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095125" }, { "category": "external", "summary": "2095129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095129" }, { "category": "external", "summary": "2095224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095224" }, { "category": "external", "summary": "2095529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095529" }, { "category": "external", "summary": "2095530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095530" }, { "category": "external", "summary": "2095532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095532" }, { "category": "external", "summary": "2095537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095537" }, { "category": "external", "summary": "2095570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095570" }, { "category": "external", "summary": "2095573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095573" }, { "category": "external", "summary": "2095953", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095953" }, { "category": "external", "summary": "2095955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095955" }, { "category": "external", "summary": "2096166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096166" }, { "category": "external", "summary": "2096206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096206" }, { "category": "external", "summary": "2096208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096208" }, { "category": "external", "summary": "2096263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096263" }, { "category": "external", "summary": "2096333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096333" }, { "category": "external", "summary": "2096492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096492" }, { "category": "external", "summary": "2096502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096502" }, { "category": "external", "summary": "2096510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096510" }, { "category": "external", "summary": "2096511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096511" }, { "category": "external", "summary": "2096620", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096620" }, { "category": "external", "summary": "2096781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096781" }, { "category": "external", "summary": "2096801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096801" }, { "category": "external", "summary": "2096845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2096845" }, { "category": "external", "summary": "2097328", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097328" }, { "category": "external", "summary": "2097370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097370" }, { "category": "external", "summary": "2097465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097465" }, { "category": "external", "summary": "2097586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097586" }, { "category": "external", "summary": "2098134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098134" }, { "category": "external", "summary": "2098135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098135" }, { "category": "external", "summary": "2098282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098282" }, { "category": "external", "summary": "2099443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099443" }, { "category": "external", "summary": "2099533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099533" }, { "category": "external", "summary": "2099535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099535" }, { "category": "external", "summary": "2099539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099539" }, { "category": "external", "summary": "2099566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099566" }, { "category": "external", "summary": "2099608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099608" }, { "category": "external", "summary": "2099633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099633" }, { "category": "external", "summary": "2099639", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099639" }, { "category": "external", "summary": "2099802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099802" }, { "category": "external", "summary": "2100054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100054" }, { "category": "external", "summary": "2100284", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100284" }, { "category": "external", "summary": "2100415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100415" }, { "category": "external", "summary": "2100495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100495" }, { "category": "external", "summary": "2101164", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101164" }, { "category": "external", "summary": "2101192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101192" }, { "category": "external", "summary": "2101430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101430" }, { "category": "external", "summary": "2101454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101454" }, { "category": "external", "summary": "2101485", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101485" }, { "category": "external", "summary": "2101628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101628" }, { "category": "external", "summary": "2101954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101954" }, { "category": "external", "summary": "2102076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102076" }, { "category": "external", "summary": "2102116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102116" }, { "category": "external", "summary": "2102117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102117" }, { "category": "external", "summary": "2102122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102122" }, { "category": "external", "summary": "2102124", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102124" }, { "category": "external", "summary": "2102125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102125" }, { "category": "external", "summary": "2102127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102127" }, { "category": "external", "summary": "2102129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102129" }, { "category": "external", "summary": "2102131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102131" }, { "category": "external", "summary": "2102135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102135" }, { "category": "external", "summary": "2102143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102143" }, { "category": "external", "summary": "2102256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102256" }, { "category": "external", "summary": "2102448", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102448" }, { "category": "external", "summary": "2102543", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102543" }, { "category": "external", "summary": "2102544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102544" }, { "category": "external", "summary": "2102545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102545" }, { "category": "external", "summary": "2104617", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104617" }, { "category": "external", "summary": "2106175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106175" }, { "category": "external", "summary": "2106258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106258" }, { "category": "external", "summary": "2110178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110178" }, { "category": "external", "summary": "2111359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111359" }, { "category": "external", "summary": "2111562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111562" }, { "category": "external", "summary": "2117872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117872" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6526.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.11.0 Images security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:03:37+00:00", "generator": { "date": "2024-12-17T22:03:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6526", "initial_release_date": "2022-09-14T19:28:51+00:00", "revision_history": [ { "date": "2022-09-14T19:28:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-14T19:28:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:03:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.11 for RHEL 8", "product": { "name": "CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.11::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.11.0-26" } } }, { "category": "product_version", "name": "container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "product": { "name": "container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "product_id": "container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "product_identification_helper": { "purl": "pkg:oci/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/checkup-framework\u0026tag=v4.11.0-67" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.11.0-26" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.11.0-26" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.11.0-63" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.11.0-601" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.11.0-21" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.11.0-21" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.11.0-21" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.11.0-24" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.11.0-96" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.11.0-96" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.11.0-26" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin\u0026tag=v4.11.0-83" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.11.0-54" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator\u0026tag=v4.11.0-29" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status\u0026tag=v4.11.0-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.11.0-17" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.11.0-106" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.11.0-26" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.11.0-26" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "product_id": "container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.11.0-106" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.11.0-106" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.11.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.11.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.11.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.11.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.11.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.11.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.11.0-59" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.11.0-106" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.11.0-106" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.11.0-16" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.11.0-106" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.11.0-106" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup\u0026tag=v4.11.0-67" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64" }, "product_reference": "container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64", "relates_to_product_reference": "8Base-CNV-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-38561", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2100495" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows an attacker to cause applications using this package to parse untrusted input data to crash, leading to a denial of service of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: out-of-bounds read in golang.org/x/text/language leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw may be triggered only by accepting untrusted user input to the vulnerable golang\u0027s library. The overall DoS attack vector depends directly on how the library\u0027s input is exposed by the consuming application, thus Red Hat rates impact as Moderate.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.5 version, the registration-operator, lighthouse-coredns, lighthouse-agent, gatekeeper-operator, and discovery-operator components are affected by this flaw, but the rest of the components are using an already patched version and are unaffected. For 2.4 and previous versions of Red Hat Advanced Cluster Management for Kubernetes (RHACM), most of the components are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38561" }, { "category": "external", "summary": "RHBZ#2100495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38561", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38561" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2021-0113", "url": "https://pkg.go.dev/vuln/GO-2021-0113" } ], "release_date": "2021-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: out-of-bounds read in golang.org/x/text/language leads to DoS" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030801" } ], "notes": [ { "category": "description", "text": "There\u0027s an uncontrolled resource consumption flaw in golang\u0027s net/http library in the canonicalHeader() function. An attacker who submits specially crafted requests to applications linked with net/http\u0027s http2 functionality could cause excessive resource consumption that could lead to a denial of service or otherwise impact to system performance and resources.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: limit growth of header canonicalization cache", "title": "Vulnerability summary" }, { "category": "other", "text": "For OpenShift Container Platform, OpenShift Virtualization, Red Hat Quay and OpenShift distributed tracing the most an attacker can possibly achieve by exploiting this vulnerability is to crash a container, temporarily impacting availability of one or more services. Therefore impact is rated Moderate.\n\nIn its default configuration, grafana as shipped in Red Hat Enterprise Linux 8 is not affected by this vulnerability. However, enabling http2 in /etc/grafana/grafana.ini explicitly would render grafana affected, therefore grafana has been marked affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44716" }, { "category": "external", "summary": "RHBZ#2030801", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030801" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44716", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44716" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" }, { "category": "workaround", "details": "This flaw can be mitigated by disabling HTTP/2. Setting the GODEBUG=http2server=0 environment variable before calling Serve will disable HTTP/2 unless it was manually configured through the golang.org/x/net/http2 package.", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: limit growth of header canonicalization cache" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-09T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2030806" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in golang\u0027s syscall.ForkExec() interface. An attacker who manages to first cause a file descriptor exhaustion for the process, then cause syscall.ForkExec() to be called repeatedly, could compromise data integrity and/or confidentiality in a somewhat uncontrolled way in programs linked with and using syscall.ForkExec().", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: don\u0027t close fd 0 on ForkExec error", "title": "Vulnerability summary" }, { "category": "other", "text": "* This flaw has had the severity level set to Moderate due to the attack complexity required to exhaust file descriptors at the time ForkExec is called, plus an attacker does not necessarily have direct control over where/how data is leaked.\n\n* For Service Telemetry Framework, because the flaw\u0027s impact is lower, no update will be provided at this time for its containers.\n\n* runc shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this flaw because the flaw is already patched in the shipped versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-44717" }, { "category": "external", "summary": "RHBZ#2030806", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030806" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-44717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44717" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k", "url": "https://groups.google.com/g/golang-announce/c/hcmEScgc00k" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" }, { "category": "workaround", "details": "This bug can be mitigated by raising the per-process file descriptor limit.", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: don\u0027t close fd 0 on ForkExec error" }, { "acknowledgments": [ { "names": [ "Oliver Brooks and James Klopchic" ], "organization": "NCC Group" } ], "cve": "CVE-2022-1798", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-08-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2117872" } ], "notes": [ { "category": "description", "text": "An arbitrary file read vulnerability was found in the kubeVirt API. This flaw makes it possible to use the kubeVirt API to provide access to host files (like /etc/passwd, for example) in a KubeVirt VM as a disk device that can be written to and read from.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubeVirt: Arbitrary file read on the host from KubeVirt VMs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1798" }, { "category": "external", "summary": "RHBZ#2117872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1798", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1798" }, { "category": "external", "summary": "https://github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hm", "url": "https://github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hm" } ], "release_date": "2022-08-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kubeVirt: Arbitrary file read on the host from KubeVirt VMs" }, { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" }, { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-27191", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064702" } ], "notes": [ { "category": "description", "text": "A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crash in a golang.org/x/crypto/ssh server", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the vulnerable golang.org/x/crypto/ssh package is bundled in many components. The affected code is in the SSH server portion that is not used, hence the impact by this vulnerability is reduced. Additionally the OCP installer components, that also bundle vulnerable golang.org/x/crypto/ssh package, are used only during the cluster installation process, hence for already deployed and running OCP clusters the installer components are considered as affected by this vulnerability but not impacted.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27191" }, { "category": "external", "summary": "RHBZ#2064702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27191" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ", "url": "https://groups.google.com/g/golang-announce/c/-cp44ypCT5s/m/wmegxkLiAQAJ" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crash in a golang.org/x/crypto/ssh server" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-14T19:28:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6526" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:faa1f729980217c7ffefa2134d5e8d851a6fb7913be7c6edf8ab7c3277b6f53d_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:055aa6e280af9bfec4c8864f4d9ed79c22bd864829cff855650ef7fed092c815_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:c7475f5f5d2c24bffc410c39168d4eba8bffa64b7e220a51291ed4e6bf053c6f_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:af41f3c3f2b88a74bfe29c6001ca5e472bb9673150bfc0be35ffad66a012a573_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:3d364b59962f15123ba6ce8b2d49b1cd38b3f1d540b3b4c0a1858e93b6cba011_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:b83c2f51067335600cc20a39a9d911ad110d700ef46f53e7a18af4e534a77534_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:562548cfd4fd0327e3cd25365251eed5abe1aafbf394b0a112b79039c802c3c3_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:37cb86f8d15856f112cff0440638cd976572216a84afac2d11c8a2188f86be34_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:ef1f3bfc036762d9060f490912fd1b43d9ce3b9c542a347b77f505ba92a51906_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:9522cee60c82b120a4dd131f6dc690786740dd85ce5e7f83171823c4b7aa93e0_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:5a70d43a90d0860ca367c004fedc7a3b82132327a9d9e6bbb1d1244cd7fddb13_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:9eb14ac44a379de4a6fe8583f582b2e39fd056beeab9951cd783e31340c0ce6a_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:884d54355a5e3f66f2916a4fd6bb182a2450f2c6a800176befc7a74b7b5cd5c9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:989137caa24e0604c230e84a7a65b7efc38ef68ef55ffe78353c51c58dd63e14_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:b4151b401146f609a0647886845233d6bd1561aaaba72866fcad6d3f4539f950_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:34e68039c045ac22068a557d548b420ab04cda5fa755404ee1c850aa6817747f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:56de4ec139a88c5f61a0cd87dc405e208992a9cf343cc6925094cbefb533f2ce_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:7c16943b0da0e7c886c2cad5a87c92db111a96b842f66971862d2d81df0a92f2_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:c0fd52ef347d2cd496a98ea67ed432074127cb6f86e64798f452968d26e39594_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:da18128194e3574952655b623395d330fd82912fc598b0804762f039cd7bd713_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:4747611e2b2648b3d765e6c728d80d339a25dd20664ecc57b70a1e09d71eee64_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:2c008c250adad10a90fad4a7be1825ba4d950a7fbf9134c7a08346c5e0483c26_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:afe3a2b76c42e27399cb71fb3c02317e89cb5f3201f9f95ec0bfa9e74c4775c4_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:b8122af35a7695f7cf99e4d36546920570e408cfba2b45c90ffd4dd2ddf47c77_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:083c332bd90cb8fbb02182926985accff8ba9a4ca351a6a7c049cb173e2cea00_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:612d67e74b6b682ea1d6358c7e766c2c499ac747ec6778a45f289ea597da736d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:3cffc89502ab45e9b47721cbca140d7946fd8afab6f1f9c6f17c17ea24374869_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:e47dc1188b335a23bbaf9aec8df03fd78dc4b62b3e41f06bc67a408363016e05_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:412af0af13fb583eb59bf00c544b2feef9f02bfcec9776ccce1750d781a35341_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:6481694e07d022162c4512c3e346bd10718219c6ed78bed0bdbb759c9be3d434_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:578e2134d5a174249a374de5c26532db98fca13a571e81ac6839ba88beb19a01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:474a57191da17d55a2a4c85fc6babbf6a052a244cd6edaa8bb67cb3987be8e7c_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:722bdbb1303c5c631dc574fd4d5873623f2b5cee18f14970ddd224a50c819b9f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:f2371c3df8800ed745ee00b2037c932e9889271d6b47f5fd4df72c0dd4559f70_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:69fbd2dee5cad3adfd2b85584e1c095a5896346497e0a58def70806f77687386_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:056d9fa9dff8ba2eca829403a5d0190a3bf2767e6ab37e7b46b4cc1885e1e2df_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:a07a7931e8778971d6e3a73fdd0cabb442e057505d6364d98adcfa2d088b4858_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:81840626baefd6558db56a060ad37ecbd21378b3a96bfe525727f8ab64b02462_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:ca64a5d33cae1ddec96abde09f97ef0845a40bf2676a319dd3fb1f1737b1826d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:69c97e3d7f039edc5a8c7075dde0114ebdb56d62cf9e4d921b40ef3847f0c75c_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:3f4a86de5c9046c44a792a75fe056976dd6763afdba22a9aededa9ed2ab781d9_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:b7e272aa99af11856b4a2d6a7f1cea4258aef13e02e0b34c7e076b3798c8169d_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" } ] }
rhsa-2022_6290
Vulnerability from csaf_redhat
Published
2022-09-01 01:24
Modified
2024-12-17 22:01
Summary
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.0 security and bug fix update
Notes
Topic
OpenShift API for Data Protection (OADP) 1.1.0 is now available.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.
Security Fix(es) from Bugzilla:
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "OpenShift API for Data Protection (OADP) 1.1.0 is now available.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* prometheus/client_golang: Denial of service using InstrumentHandlerCounter (CVE-2022-21698)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6290", "url": "https://access.redhat.com/errata/RHSA-2022:6290" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "OADP-145", "url": "https://issues.redhat.com/browse/OADP-145" }, { "category": "external", "summary": "OADP-154", "url": "https://issues.redhat.com/browse/OADP-154" }, { "category": "external", "summary": "OADP-194", "url": "https://issues.redhat.com/browse/OADP-194" }, { "category": "external", "summary": "OADP-199", "url": "https://issues.redhat.com/browse/OADP-199" }, { "category": "external", "summary": "OADP-224", "url": "https://issues.redhat.com/browse/OADP-224" }, { "category": "external", "summary": "OADP-225", "url": "https://issues.redhat.com/browse/OADP-225" }, { "category": "external", "summary": "OADP-234", "url": "https://issues.redhat.com/browse/OADP-234" }, { "category": "external", "summary": "OADP-324", "url": "https://issues.redhat.com/browse/OADP-324" }, { "category": "external", "summary": "OADP-382", "url": "https://issues.redhat.com/browse/OADP-382" }, { "category": "external", "summary": "OADP-422", "url": "https://issues.redhat.com/browse/OADP-422" }, { "category": "external", "summary": "OADP-423", "url": "https://issues.redhat.com/browse/OADP-423" }, { "category": "external", "summary": "OADP-478", "url": "https://issues.redhat.com/browse/OADP-478" }, { "category": "external", "summary": "OADP-528", "url": "https://issues.redhat.com/browse/OADP-528" }, { "category": "external", "summary": "OADP-533", "url": "https://issues.redhat.com/browse/OADP-533" }, { "category": "external", "summary": "OADP-538", "url": "https://issues.redhat.com/browse/OADP-538" }, { "category": "external", "summary": "OADP-552", "url": "https://issues.redhat.com/browse/OADP-552" }, { "category": "external", "summary": "OADP-558", "url": "https://issues.redhat.com/browse/OADP-558" }, { "category": "external", "summary": "OADP-585", "url": "https://issues.redhat.com/browse/OADP-585" }, { "category": "external", "summary": "OADP-586", "url": "https://issues.redhat.com/browse/OADP-586" }, { "category": "external", "summary": "OADP-592", "url": "https://issues.redhat.com/browse/OADP-592" }, { "category": "external", "summary": "OADP-597", "url": "https://issues.redhat.com/browse/OADP-597" }, { "category": "external", "summary": "OADP-598", "url": "https://issues.redhat.com/browse/OADP-598" }, { "category": "external", "summary": "OADP-599", "url": "https://issues.redhat.com/browse/OADP-599" }, { "category": "external", "summary": "OADP-600", "url": "https://issues.redhat.com/browse/OADP-600" }, { "category": "external", "summary": "OADP-602", "url": "https://issues.redhat.com/browse/OADP-602" }, { "category": "external", "summary": "OADP-605", "url": "https://issues.redhat.com/browse/OADP-605" }, { "category": "external", "summary": "OADP-607", "url": "https://issues.redhat.com/browse/OADP-607" }, { "category": "external", "summary": "OADP-610", "url": "https://issues.redhat.com/browse/OADP-610" }, { "category": "external", "summary": "OADP-613", "url": "https://issues.redhat.com/browse/OADP-613" }, { "category": "external", "summary": "OADP-637", "url": "https://issues.redhat.com/browse/OADP-637" }, { "category": "external", "summary": "OADP-643", "url": "https://issues.redhat.com/browse/OADP-643" }, { "category": "external", "summary": "OADP-644", "url": "https://issues.redhat.com/browse/OADP-644" }, { "category": "external", "summary": "OADP-648", "url": "https://issues.redhat.com/browse/OADP-648" }, { "category": "external", "summary": "OADP-652", "url": "https://issues.redhat.com/browse/OADP-652" }, { "category": "external", "summary": "OADP-655", "url": "https://issues.redhat.com/browse/OADP-655" }, { "category": "external", "summary": "OADP-660", "url": "https://issues.redhat.com/browse/OADP-660" }, { "category": "external", "summary": "OADP-698", "url": "https://issues.redhat.com/browse/OADP-698" }, { "category": "external", "summary": "OADP-715", "url": "https://issues.redhat.com/browse/OADP-715" }, { "category": "external", "summary": "OADP-716", "url": "https://issues.redhat.com/browse/OADP-716" }, { "category": "external", "summary": "OADP-736", "url": "https://issues.redhat.com/browse/OADP-736" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6290.json" } ], "title": "Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.0 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:01:48+00:00", "generator": { "date": "2024-12-17T22:01:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6290", "initial_release_date": "2022-09-01T01:24:16+00:00", "revision_history": [ { "date": "2022-09-01T01:24:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-01T01:24:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:01:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-OADP-1.1", "product": { "name": "8Base-OADP-1.1", "product_id": "8Base-OADP-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_api_data_protection:1.1::el8" } } } ], "category": "product_family", "name": "OpenShift API for Data Protection" }, { "branches": [ { "category": "product_version", "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "product": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "product_id": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8\u0026tag=1.1.0-21" } } }, { "category": "product_version", "name": "oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "product": { "name": "oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "product_id": "oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-mustgather-rhel8\u0026tag=1.1.0-63" } } }, { "category": "product_version", "name": "oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "product": { "name": "oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "product_id": "oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-operator-bundle\u0026tag=1.1.0-74" } } }, { "category": "product_version", "name": "oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "product": { "name": "oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "product_id": "oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-rhel8-operator\u0026tag=1.1.0-50" } } }, { "category": "product_version", "name": "oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "product": { "name": "oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "product_id": "oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-velero-rhel8\u0026tag=1.1.0-27" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "product": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "product_id": "oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-rhel8\u0026tag=1.1.0-20" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "product": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "product_id": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "product": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "product_id": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8\u0026tag=1.1.0-25" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "product": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "product_id": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "product": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "product_id": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "product": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "product_id": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8\u0026tag=1.1.0-25" } } }, { "category": "product_version", "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "product": { "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "product_id": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "product_identification_helper": { "purl": "pkg:oci/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c?arch=s390x\u0026repository_url=registry.redhat.io/oadp/oadp-volume-snapshot-mover-rhel8\u0026tag=1.1.0-24" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "product": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "product_id": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8\u0026tag=1.1.0-21" } } }, { "category": "product_version", "name": "oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "product": { "name": "oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "product_id": "oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-mustgather-rhel8\u0026tag=1.1.0-63" } } }, { "category": "product_version", "name": "oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "product": { "name": "oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "product_id": "oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-operator-bundle\u0026tag=1.1.0-74" } } }, { "category": "product_version", "name": "oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "product": { "name": "oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "product_id": "oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-rhel8-operator\u0026tag=1.1.0-50" } } }, { "category": "product_version", "name": "oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "product": { "name": "oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "product_id": "oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-rhel8\u0026tag=1.1.0-27" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "product": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "product_id": "oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-rhel8\u0026tag=1.1.0-20" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "product_id": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "product_id": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8\u0026tag=1.1.0-25" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "product_id": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "product_id": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "product": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "product_id": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8\u0026tag=1.1.0-25" } } }, { "category": "product_version", "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64", "product": { "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64", "product_id": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-volume-snapshot-mover-rhel8\u0026tag=1.1.0-24" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "product": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "product_id": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8\u0026tag=1.1.0-21" } } }, { "category": "product_version", "name": "oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "product": { "name": "oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "product_id": "oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-mustgather-rhel8\u0026tag=1.1.0-63" } } }, { "category": "product_version", "name": "oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "product": { "name": "oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "product_id": "oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-operator-bundle\u0026tag=1.1.0-74" } } }, { "category": "product_version", "name": "oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "product": { "name": "oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "product_id": "oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-rhel8-operator\u0026tag=1.1.0-50" } } }, { "category": "product_version", "name": "oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "product": { "name": "oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "product_id": "oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-velero-rhel8\u0026tag=1.1.0-27" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "product": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "product_id": "oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-rhel8\u0026tag=1.1.0-20" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "product": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "product_id": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "product": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "product_id": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8\u0026tag=1.1.0-25" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "product": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "product_id": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "product": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "product_id": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8\u0026tag=1.1.0-17" } } }, { "category": "product_version", "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "product": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "product_id": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8\u0026tag=1.1.0-25" } } }, { "category": "product_version", "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "product": { "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "product_id": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f?arch=ppc64le\u0026repository_url=registry.redhat.io/oadp/oadp-volume-snapshot-mover-rhel8\u0026tag=1.1.0-24" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le" }, "product_reference": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64" }, "product_reference": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x" }, "product_reference": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x" }, "product_reference": "oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le" }, "product_reference": "oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64" }, "product_reference": "oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le" }, "product_reference": "oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64" }, "product_reference": "oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" }, "product_reference": "oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x" }, "product_reference": "oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64" }, "product_reference": "oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le" }, "product_reference": "oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x" }, "product_reference": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le" }, "product_reference": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le" }, "product_reference": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x" }, "product_reference": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x" }, "product_reference": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le" }, "product_reference": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le" }, "product_reference": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x" }, "product_reference": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x" }, "product_reference": "oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le" }, "product_reference": "oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64" }, "product_reference": "oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le" }, "product_reference": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64" }, "product_reference": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x" }, "product_reference": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64" }, "product_reference": "oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le" }, "product_reference": "oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x" }, "product_reference": "oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le" }, "product_reference": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x" }, "product_reference": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "relates_to_product_reference": "8Base-OADP-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64 as a component of 8Base-OADP-1.1", "product_id": "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" }, "product_reference": "oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64", "relates_to_product_reference": "8Base-OADP-1.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-21698", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2022-01-19T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045880" } ], "notes": [ { "category": "description", "text": "A denial of service attack was found in prometheus/client_golang. This flaw allows an attacker to produce a denial of service attack on an HTTP server by exploiting the InstrumentHandlerCounter function in the version below 1.11.1, resulting in a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having a moderate impact for two main reasons. The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. Additionally, this is in alignment with upstream\u0027s (the Prometheus project) impact rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64" ], "known_not_affected": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21698" }, { "category": "external", "summary": "RHBZ#2045880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045880" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21698" }, { "category": "external", "summary": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p", "url": "https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p" } ], "release_date": "2022-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T01:24:16+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6290" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "prometheus/client_golang: Denial of service using InstrumentHandlerCounter" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "known_not_affected": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T01:24:16+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6290" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "known_not_affected": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T01:24:16+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6290" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "known_not_affected": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T01:24:16+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6290" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "known_not_affected": [ "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-01T01:24:16+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6290" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:649a065b112210ed1248ba2cadecc3d522b888239dc73942934e526fba1d69ad_ppc64le", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:7368b20e3a42ea915f3811f0c9d21e509cbd054efacbd297e88e81fc27a49837_amd64", "8Base-OADP-1.1:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:cde730978fa438855891755309c3bb75dc38771f1a94f9ff26a0a1b31a129f01_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:183d6de4eed893e0a76d661fdc13858e57a2ed5aeb34f3be6cb6850ef180d141_s390x", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:3bf1c9f828cf6f3e318078f081a4fc50a7c2efc8c12d09e6feddc8593cb8727a_ppc64le", "8Base-OADP-1.1:oadp/oadp-mustgather-rhel8@sha256:a17ef49b0cae63b6a7735180683b4d9a15a9a3caa0f14e10ced1e62d0878c3b0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:95671d1a49ec698f3efd842fa03d98aa2128c2367a0f81f695c47d1bff047bd9_ppc64le", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:d7441686f4447f6b600c08c8d697e4db91b8b927554df6785d61a8d851baacf0_amd64", "8Base-OADP-1.1:oadp/oadp-operator-bundle@sha256:dcae0dc90e97361b931ab189f52021a3a4add42fd02033053f32924580af4dc5_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:993c32f9a9ceba160e76fc2200deca5675506c00f2411bc1dbb16c7458789d5d_s390x", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:ea946614675a9479631e3d5dafae5219dc07c6fe239a833143b69be7f73fa7f5_amd64", "8Base-OADP-1.1:oadp/oadp-rhel8-operator@sha256:eb2965df49c5ff2d53be06b7b4d488510f569c7aaf567999e6d467556572814d_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:687c4ab44bd97d033fd3d7fd23d9e0bc011d006608cdfedab668a1fde874d54f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:cb225573b7adf5956fb12c01e43ba1f04d80e4f820c9aa6af6a50924980c1ea2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:dded3f6cc24924b79dbb8e6e79b800274f2054b737a42e93176783605859907e_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:36c9326a4b96448cb00582d7296270a927761ba0f0616fb8ed4c5987d4e8a70c_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:cd92d9d091b62421632d941db6a9b2c33c1965cf4112a9fb036a09ebe988b91c_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:e9e24889681ccd31df9d1831afdf0993f6ce6cd24fde3b4795fe16d824e0416f_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:01fe6a0edd12b1e2502eaf14ad6d8e29f2b014c0a28883e4f7523a3acb931ec9_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:7e8544cc441e90e3a44f333f418959f2afe106a04bd117c42a5c482ed7e74d99_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:e4f3b3a59db8d9180010e87b7502fd3418340cd082bc36f79c6bb38327e925e0_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:24b9694e68a16a51220789c91dc00ead20c531221de4a5bae7d9fa7107cbe707_amd64", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:3dd0e9f28febd7e31e6250fc0a86f9908b501bfec9368388c0228aefc5059acd_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:69745821846f79362dc9f39bc702fd481db05e82913edb718502a311ce38ab8e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:0f90a21e45f9d76b6abedcd1b6ffe2843045163702b5f9038f715bf3db0e1b4e_s390x", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:63d5f5165b1fb8942ae60f4b14af2fe39bcc054184c93695b91ef7c26e9eafb2_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-plugin-rhel8@sha256:bab55f61f70fe687df984186240c76c5b10f7b5362b2f9a4e21a47d4494d02f2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:22db35503cef946d1a193f5531017a456d3b34bc26d2b431954f5d385b7be9d8_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:268761f1d56d84d41f0a1bd35ae9a050cab7407b4bf47b4a64eb07aef275194e_amd64", "8Base-OADP-1.1:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:45ae2d99bc7d4c93bace74f285805faa0ad27561037b6b2406e6c4e86ac669f7_s390x", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:4e78c9adf01a838ccce151c88bdaf331105472857d096194b6f628ce246e43b2_amd64", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:5a11fc682e58aefed3c33c77a536e6677f7bfbac18ca624f7004f7d44a1b8446_ppc64le", "8Base-OADP-1.1:oadp/oadp-velero-rhel8@sha256:af3c09e10824aebdaf117391ac53519e7128fe789252f8ecb4b144883e74c8e9_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:4c7febd90b1af2af27ab252d9774c49a9387d63589fde14d76e25e348c224c7f_ppc64le", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:8e2322c382d4cbc9717833c702ebd04dfaf2afe04ce87990662569552e78357c_s390x", "8Base-OADP-1.1:oadp/oadp-volume-snapshot-mover-rhel8@sha256:cde9184ab5f6fd8f4448913d802d0dcdf2a6830facc1a4732dec6eb09bf1b273_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" } ] }
rhsa-2023_1529
Vulnerability from csaf_redhat
Published
2023-03-30 00:42
Modified
2024-12-17 22:14
Summary
Red Hat Security Advisory: Service Telemetry Framework 1.5 security update
Notes
Topic
An update is now available for Service Telemetry Framework 1.5.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. STF then transmits the information to a centralized, receiving Red Hat OpenShift Container Platform (OCP) deployment for storage, retrieval, and monitoring.
Security Fix(es):
* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)
* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Service Telemetry Framework 1.5.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes. STF then transmits the information to a centralized, receiving Red Hat OpenShift Container Platform (OCP) deployment for storage, retrieval, and monitoring.\n\nSecurity Fix(es):\n\n* golang: crypto/elliptic: IsOnCurve returns true for invalid field elements (CVE-2022-23806)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n\n* golang: cmd/go: misinterpretation of branch names can lead to incorrect access control (CVE-2022-23773)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\n* golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\n\n* golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\n\n* golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1529", "url": "https://access.redhat.com/errata/RHSA-2023:1529" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2092544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092544" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "2176537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176537" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1529.json" } ], "title": "Red Hat Security Advisory: Service Telemetry Framework 1.5 security update", "tracking": { "current_release_date": "2024-12-17T22:14:48+00:00", "generator": { "date": "2024-12-17T22:14:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1529", "initial_release_date": "2023-03-30T00:42:39+00:00", "revision_history": [ { "date": "2023-03-30T00:42:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-30T00:42:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:14:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Service Telemetry Framework 1.5 for RHEL 8", "product": { "name": "Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_telemetry_framework:1.5::el8" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "product": { "name": "stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "product_id": "stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "product_identification_helper": { "purl": "pkg:oci/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f?arch=amd64\u0026repository_url=registry.redhat.io/stf/prometheus-webhook-snmp-rhel8\u0026tag=1.5.2-2" } } }, { "category": "product_version", "name": "stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "product": { "name": "stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "product_id": "stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "product_identification_helper": { "purl": "pkg:oci/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717?arch=amd64\u0026repository_url=registry.redhat.io/stf/service-telemetry-operator-bundle\u0026tag=1.5.1678301890-1" } } }, { "category": "product_version", "name": "stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "product": { "name": "stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "product_id": "stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "product_identification_helper": { "purl": "pkg:oci/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0?arch=amd64\u0026repository_url=registry.redhat.io/stf/service-telemetry-rhel8-operator\u0026tag=1.5.1-2" } } }, { "category": "product_version", "name": "stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "product": { "name": "stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "product_id": "stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "product_identification_helper": { "purl": "pkg:oci/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28?arch=amd64\u0026repository_url=registry.redhat.io/stf/sg-bridge-rhel8\u0026tag=1.5.0-12" } } }, { "category": "product_version", "name": "stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "product": { "name": "stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "product_id": "stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "product_identification_helper": { "purl": "pkg:oci/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37?arch=amd64\u0026repository_url=registry.redhat.io/stf/sg-core-rhel8\u0026tag=5.1.1-2" } } }, { "category": "product_version", "name": "stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "product": { "name": "stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "product_id": "stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "product_identification_helper": { "purl": "pkg:oci/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546?arch=amd64\u0026repository_url=registry.redhat.io/stf/smart-gateway-operator-bundle\u0026tag=5.0.1678301890-1" } } }, { "category": "product_version", "name": "stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64", "product": { "name": "stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64", "product_id": "stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64", "product_identification_helper": { "purl": "pkg:oci/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471?arch=amd64\u0026repository_url=registry.redhat.io/stf/smart-gateway-rhel8-operator\u0026tag=5.0.1-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64 as a component of Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64" }, "product_reference": "stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "relates_to_product_reference": "8Base-STF-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64 as a component of Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64" }, "product_reference": "stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "relates_to_product_reference": "8Base-STF-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64 as a component of Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64" }, "product_reference": "stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "relates_to_product_reference": "8Base-STF-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64 as a component of Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64" }, "product_reference": "stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "relates_to_product_reference": "8Base-STF-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64 as a component of Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" }, "product_reference": "stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "relates_to_product_reference": "8Base-STF-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64 as a component of Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64" }, "product_reference": "stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "relates_to_product_reference": "8Base-STF-1.5" }, { "category": "default_component_of", "full_product_name": { "name": "stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64 as a component of Service Telemetry Framework 1.5 for RHEL 8", "product_id": "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" }, "product_reference": "stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64", "relates_to_product_reference": "8Base-STF-1.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-23773", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053541" } ], "notes": [ { "category": "description", "text": "A flaw was found in the go package of the cmd library in golang. The go command could be tricked into accepting a branch, which resembles a version tag. This issue could allow a remote unauthenticated attacker to bypass security restrictions and introduce invalid or incorrect tags, reducing the integrity of the environment.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23773" }, { "category": "external", "summary": "RHBZ#2053541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23773" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23773" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: cmd/go: misinterpretation of branch names can lead to incorrect access control" }, { "cve": "CVE-2022-23806", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053429" } ], "notes": [ { "category": "description", "text": "A flaw was found in the elliptic package of the crypto library in golang when the IsOnCurve function could return true for invalid field elements. This flaw allows an attacker to take advantage of this undefined behavior, affecting the availability and integrity of the resource.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact. The issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7; hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16 \u0026 1.17), will not be addressed in future updates as shipped only in RHEL-7, hence, marked as Out-of-Support-Scope.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23806" }, { "category": "external", "summary": "RHBZ#2053429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23806", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23806" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: IsOnCurve returns true for invalid field elements" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-32189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2113814" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32189" }, { "category": "external", "summary": "RHBZ#2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189" }, { "category": "external", "summary": "https://go.dev/issue/53871", "url": "https://go.dev/issue/53871" }, { "category": "external", "summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", "url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU" } ], "release_date": "2022-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2161274" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "known_not_affected": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41717" }, { "category": "external", "summary": "RHBZ#2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717" }, { "category": "external", "summary": "https://go.dev/cl/455635", "url": "https://go.dev/cl/455635" }, { "category": "external", "summary": "https://go.dev/cl/455717", "url": "https://go.dev/cl/455717" }, { "category": "external", "summary": "https://go.dev/issue/56350", "url": "https://go.dev/issue/56350" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2022-1144", "url": "https://pkg.go.dev/vuln/GO-2022-1144" } ], "release_date": "2022-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-30T00:42:39+00:00", "details": "The Service Telemetry Framework container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Installation instructions for your platform are available at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally.", "product_ids": [ "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1529" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-STF-1.5:stf/prometheus-webhook-snmp-rhel8@sha256:a53c3dc5955a72913788a3eeda32f725b2f5ef6e893022cc358f20414eb5074f_amd64", "8Base-STF-1.5:stf/service-telemetry-operator-bundle@sha256:617009676fbc385e222f144f79819b2cdcdafb28ae8674a53cdf8676f69d3717_amd64", "8Base-STF-1.5:stf/service-telemetry-rhel8-operator@sha256:f71352691d5e680eb09a67ef2e7208a40a10a0b781b451150ced7408dfc603d0_amd64", "8Base-STF-1.5:stf/sg-bridge-rhel8@sha256:d42174e8f6fbc91666ee2d78483f362f4de3f0ea551ea6d2bf310dadb1b5ba28_amd64", "8Base-STF-1.5:stf/sg-core-rhel8@sha256:f3ac213d5ff7470ad8a9175fa699033c5c2ee7cd6cf5eb5f4e081de00e94cd37_amd64", "8Base-STF-1.5:stf/smart-gateway-operator-bundle@sha256:08209b33986a186c90ec84140c833fdd892358583d3a7cb8c73f4732fe210546_amd64", "8Base-STF-1.5:stf/smart-gateway-rhel8-operator@sha256:9ea6481e460623bd551f5facb1d8cee105103ad380a32cb3efcc0714b60db471_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests" } ] }
rhsa-2023_1042
Vulnerability from csaf_redhat
Published
2023-03-06 18:38
Modified
2024-12-17 22:13
Summary
Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)
Notes
Topic
Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional
operator, based on the Kubernetes Event Driven Autoscaler (KEDA), that allows workloads to be scaled using additional metrics sources other than pod metrics.
This release builds upon updated compiler, runtime library, and base images for the purpose of resolving any potential security issues present in previous toolset versions.
This version makes use of newer tools and libraries to address the following issues:
golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)
golang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)
golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
golang: io/fs: stack exhaustion in Glob (CVE-2022-30630)
golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
golang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)
golang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)
golang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)
golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)
golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)
golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional\noperator, based on the Kubernetes Event Driven Autoscaler (KEDA), that allows workloads to be scaled using additional metrics sources other than pod metrics.\nThis release builds upon updated compiler, runtime library, and base images for the purpose of resolving any potential security issues present in previous toolset versions.\n\nThis version makes use of newer tools and libraries to address the following issues:\ngolang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\ngolang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\ngolang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\ngolang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\ngolang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\ngolang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\ngolang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\ngolang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\ngolang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\ngolang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\ngolang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\ngolang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\ngolang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\ngolang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\ngolang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1042", "url": "https://access.redhat.com/errata/RHSA-2023:1042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2100763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100763" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "2113945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113945" }, { "category": "external", "summary": "2118404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118404" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "OCPNODE-1260", "url": "https://issues.redhat.com/browse/OCPNODE-1260" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1042.json" } ], "title": "Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)", "tracking": { "current_release_date": "2024-12-17T22:13:24+00:00", "generator": { "date": "2024-12-17T22:13:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1042", "initial_release_date": "2023-03-06T18:38:53+00:00", "revision_history": [ { "date": "2023-03-06T18:38:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-06T18:38:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:13:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Custom Metrics Autoscaler 2", "product": { "name": "OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8" } } } ], "category": "product_family", "name": "OpenShift Custom Metrics Autoscaler" }, { "branches": [ { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8\u0026tag=2.8.2-143" } } }, { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8\u0026tag=2.8.2-143" } } }, { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle\u0026tag=2.8.2-143" } } }, { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator\u0026tag=2.8.2-143" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "relates_to_product_reference": "8Base-OCMA-2" }, { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "relates_to_product_reference": "8Base-OCMA-2" }, { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "relates_to_product_reference": "8Base-OCMA-2" }, { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "relates_to_product_reference": "8Base-OCMA-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-2879", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/tar: unbounded memory consumption when reading headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2879" }, { "category": "external", "summary": "RHBZ#2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54853", "url": "https://github.com/golang/go/issues/54853" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/tar: unbounded memory consumption when reading headers" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" } ] }
rhsa-2023_3914
Vulnerability from csaf_redhat
Published
2023-07-06 02:47
Modified
2024-12-17 22:22
Summary
Red Hat Security Advisory: Red Hat OpenShift Enterprise security update
Notes
Topic
Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container Platform 4.11.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2023:3915
Security Fix(es):
* openshift: OCP & FIPS mode (CVE-2023-3089)
* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)
* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.11.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:3915\n\nSecurity Fix(es):\n\n* openshift: OCP \u0026 FIPS mode (CVE-2023-3089)\n\n* golang: html/template: improper handling of JavaScript whitespace (CVE-2023-24540)\n\n* golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString (CVE-2022-23772)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.11 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3914", "url": "https://access.redhat.com/errata/RHSA-2023:3914" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001" }, { "category": "external", "summary": "2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "2196027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027" }, { "category": "external", "summary": "2212085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212085" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3914.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Enterprise security update", "tracking": { "current_release_date": "2024-12-17T22:22:34+00:00", "generator": { "date": "2024-12-17T22:22:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3914", "initial_release_date": "2023-07-06T02:47:40+00:00", "revision_history": [ { "date": "2023-07-06T02:47:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-06T02:47:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:22:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.11", "product": { "name": "Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.11::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-3.rhaos4.11.el8.src", "product": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.src", "product_id": "buildah-1:1.23.4-3.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-3.rhaos4.11.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-3.rhaos4.11.el8.src", "product": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.src", "product_id": "conmon-2:2.1.2-3.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-3.rhaos4.11.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "product": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "product_id": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-6.rhaos4.11.el8?arch=src" } } }, { "category": "product_version", "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "product": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "product_id": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "product": { "name": "openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "product_id": "openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.11.0-202306260054.p0.g990d55b.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "product": { "name": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "product_id": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.11.0-202306280915.p0.gc732699.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "podman-2:4.0.2-7.rhaos4.11.el8.src", "product": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.src", "product_id": "podman-2:4.0.2-7.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-7.rhaos4.11.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-2.rhaos4.11.el8.src", "product": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.src", "product_id": "runc-3:1.1.2-2.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-2.rhaos4.11.el8?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.src", "product": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.src", "product_id": "skopeo-2:1.5.2-4.rhaos4.11.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-4.rhaos4.11.el8?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "product": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_id": "buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-3.rhaos4.11.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "product": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_id": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-3.rhaos4.11.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "product": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_id": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-3.rhaos4.11.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "product": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_id": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-3.rhaos4.11.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_id": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-3.rhaos4.11.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "product": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "product_id": "conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-3.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "product": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "product_id": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-3.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "product": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "product_id": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-3.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "product": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "product_id": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-6.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-6.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-6.rhaos4.11.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product_id": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product_id": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=x86_64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product_id": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202306260054.p0.g990d55b.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_id": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-7.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "product": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "product_id": "runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-2.rhaos4.11.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "product": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "product_id": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-2.rhaos4.11.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "product": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "product_id": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-2.rhaos4.11.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_id": "skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-4.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_id": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-4.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_id": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-4.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "product": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_id": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-4.rhaos4.11.el8?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "product": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_id": "buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-3.rhaos4.11.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "product": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_id": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-3.rhaos4.11.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "product": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_id": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-3.rhaos4.11.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "product": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_id": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-3.rhaos4.11.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_id": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-3.rhaos4.11.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "product": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "product_id": "conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-3.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "product": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "product_id": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-3.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "product": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "product_id": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-3.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "product": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "product_id": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-6.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-6.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-6.rhaos4.11.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product_id": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product_id": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=aarch64" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product_id": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "product": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "product_id": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202306260054.p0.g990d55b.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "product": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "product_id": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_id": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-7.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "product": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "product_id": "runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-2.rhaos4.11.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "product": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "product_id": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-2.rhaos4.11.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "product": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "product_id": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-2.rhaos4.11.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_id": "skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-4.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_id": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-4.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_id": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-4.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "product": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_id": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-4.rhaos4.11.el8?arch=aarch64\u0026epoch=2" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_id": "buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_id": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_id": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_id": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product_id": "conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product_id": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product_id": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-3.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product_id": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-6.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-6.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-6.rhaos4.11.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product_id": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product_id": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product_id": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202306260054.p0.g990d55b.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_id": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-7.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product_id": "runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-2.rhaos4.11.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product_id": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-2.rhaos4.11.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product_id": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-2.rhaos4.11.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_id": "skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-4.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_id": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-4.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_id": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-4.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_id": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-4.rhaos4.11.el8?arch=ppc64le\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "product": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "product_id": "buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-3.rhaos4.11.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "product": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "product_id": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-3.rhaos4.11.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "product": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "product_id": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-3.rhaos4.11.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "product": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "product_id": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-3.rhaos4.11.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "product_id": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-3.rhaos4.11.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "product": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "product_id": "conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-3.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "product": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "product_id": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-3.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "product": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "product_id": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-3.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "product": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "product_id": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-6.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-6.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-6.rhaos4.11.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product_id": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product_id": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debugsource@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=s390x" } } }, { "category": "product_version", "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product_id": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cri-o-debuginfo@1.24.6-2.rhaos4.11.git4bfe15a.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.11.0-202306260054.p0.g990d55b.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_id": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.0.2-7.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "runc-3:1.1.2-2.rhaos4.11.el8.s390x", "product": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.s390x", "product_id": "runc-3:1.1.2-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.2-2.rhaos4.11.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "product": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "product_id": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.2-2.rhaos4.11.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "product": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "product_id": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.2-2.rhaos4.11.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "product": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "product_id": "skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.5.2-4.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "product": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "product_id": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.5.2-4.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "product": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "product_id": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.5.2-4.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "product": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "product_id": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.5.2-4.rhaos4.11.el8?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "product_id": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "product_id": "openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.11.0-202306280915.p0.gc732699.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.11.0-202306280915.p0.gc732699.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.11.0-202306280915.p0.gc732699.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.11.0-202306280915.p0.gc732699.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "product": { "name": "podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "product_id": "podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.0.2-7.rhaos4.11.el8?arch=noarch\u0026epoch=2" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64" }, "product_reference": "buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le" }, "product_reference": "buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x" }, "product_reference": "buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src" }, "product_reference": "buildah-1:1.23.4-3.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64" }, "product_reference": "buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64" }, "product_reference": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x" }, "product_reference": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64" }, "product_reference": "buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64" }, "product_reference": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le" }, "product_reference": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x" }, "product_reference": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64" }, "product_reference": "buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64" }, "product_reference": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le" }, "product_reference": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x" }, "product_reference": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64" }, "product_reference": "buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64" }, "product_reference": "conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le" }, "product_reference": "conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x" }, "product_reference": "conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src" }, "product_reference": "conmon-2:2.1.2-3.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64" }, "product_reference": "conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64" }, "product_reference": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le" }, "product_reference": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x" }, "product_reference": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64" }, "product_reference": "conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64" }, "product_reference": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le" }, "product_reference": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x" }, "product_reference": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64" }, "product_reference": "conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64" }, "product_reference": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le" }, "product_reference": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x" }, "product_reference": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src" }, "product_reference": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64" }, "product_reference": "containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64" }, "product_reference": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le" }, "product_reference": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x" }, "product_reference": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src" }, "product_reference": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64" }, "product_reference": "cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64" }, "product_reference": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le" }, "product_reference": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x" }, "product_reference": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64" }, "product_reference": "cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64" }, "product_reference": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le" }, "product_reference": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x" }, "product_reference": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64" }, "product_reference": "cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src" }, "product_reference": "openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64" }, "product_reference": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64" }, "product_reference": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src" }, "product_reference": "podman-2:4.0.2-7.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch" }, "product_reference": "podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64" }, "product_reference": "podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le" }, "product_reference": "podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x" }, "product_reference": "podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64" }, "product_reference": "podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64" }, "product_reference": "runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le" }, "product_reference": "runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x" }, "product_reference": "runc-3:1.1.2-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src" }, "product_reference": "runc-3:1.1.2-2.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.2-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64" }, "product_reference": "runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64" }, "product_reference": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le" }, "product_reference": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x" }, "product_reference": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64" }, "product_reference": "runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64" }, "product_reference": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le" }, "product_reference": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x" }, "product_reference": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64" }, "product_reference": "runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.src as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src" }, "product_reference": "skopeo-2:1.5.2-4.rhaos4.11.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64" }, "product_reference": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le" }, "product_reference": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x" }, "product_reference": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.11", "product_id": "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" }, "product_reference": "skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23772", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-02-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053532" } ], "notes": [ { "category": "description", "text": "A flaw was found in the big package of the math library in golang. The Rat.SetString could cause an overflow, and if left unhandled, it could lead to excessive memory use. This issue could allow a remote attacker to impact the availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23772" }, { "category": "external", "summary": "RHBZ#2053532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23772" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23772" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ", "url": "https://groups.google.com/g/golang-announce/c/SUsQn0aSgPQ" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-06T02:47:40+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3914" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-06T02:47:40+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3914" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-06T02:47:40+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3914" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-06T02:47:40+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", "product_ids": [ "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3914" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2161274" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41717" }, { "category": "external", "summary": "RHBZ#2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717" }, { "category": "external", "summary": "https://go.dev/cl/455635", "url": "https://go.dev/cl/455635" }, { "category": "external", "summary": "https://go.dev/cl/455717", "url": "https://go.dev/cl/455717" }, { "category": "external", "summary": "https://go.dev/issue/56350", "url": "https://go.dev/issue/56350" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2022-1144", "url": "https://pkg.go.dev/vuln/GO-2022-1144" } ], "release_date": "2022-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-06T02:47:40+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", "product_ids": [ "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3914" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests" }, { "acknowledgments": [ { "names": [ "David Benoit" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-3089", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2023-06-03T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212085" } ], "notes": [ { "category": "description", "text": "A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.", "title": "Vulnerability description" }, { "category": "summary", "text": "openshift: OCP \u0026 FIPS mode", "title": "Vulnerability summary" }, { "category": "other", "text": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001\n\nThe static scanning tool (to verify your system is once again compliant with FIPS) is available here https://github.com/openshift/check-payload", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3089" }, { "category": "external", "summary": "RHBZ#2212085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212085" }, { "category": "external", "summary": "RHSB-2023-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3089", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3089" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3089", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3089" } ], "release_date": "2023-07-05T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-06T02:47:40+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", "product_ids": [ "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3914" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected packages as soon as possible.", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openshift: OCP \u0026 FIPS mode" }, { "acknowledgments": [ { "names": [ "Juho Nurminen" ], "organization": "Mattermost" } ], "cve": "CVE-2023-24540", "cwe": { "id": "CWE-176", "name": "Improper Handling of Unicode Encoding" }, "discovery_date": "2023-05-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2196027" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set \"\\t\\n\\f\\r\\u0020\\u2028\\u2029\" in JavaScript contexts that also contain actions may not be properly sanitized during execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: html/template: improper handling of JavaScript whitespace", "title": "Vulnerability summary" }, { "category": "other", "text": "For Red Hat Enterprise Linux,\n* Conmon uses go in unit testing, but not functionally in the package. Go is used only in test files, hence, not in the actual code, thus, conmon is not affected.\n* The Go templates in Grafana do not contain any javascript. Thus, it is not affected.\n* Ignition does not make use of html/template.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the affected containers are behind OpenShift OAuth authentication. This restricts access to the vulnerable golang html/templates to authenticated users only, therefore the impact is low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-24540" }, { "category": "external", "summary": "RHBZ#2196027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196027" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-24540", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24540" }, { "category": "external", "summary": "https://go.dev/issue/59721", "url": "https://go.dev/issue/59721" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU", "url": "https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU" } ], "release_date": "2023-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-06T02:47:40+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3914" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:buildah-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-debugsource-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:buildah-tests-debuginfo-1:1.23.4-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.src", "8Base-RHOSE-4.11:conmon-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debuginfo-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:conmon-debugsource-2:2.1.2-3.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.src", "8Base-RHOSE-4.11:containernetworking-plugins-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debuginfo-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:containernetworking-plugins-debugsource-0:1.0.1-6.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.src", "8Base-RHOSE-4.11:cri-o-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debuginfo-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.aarch64", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.ppc64le", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.s390x", "8Base-RHOSE-4.11:cri-o-debugsource-0:1.24.6-2.rhaos4.11.git4bfe15a.el8.x86_64", "8Base-RHOSE-4.11:openshift-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-ansible-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-ansible-test-0:4.11.0-202306230041.p0.g0a466d7.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-clients-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-clients-redistributable-0:4.11.0-202306231116.p0.g2ae2303.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.aarch64", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.s390x", "8Base-RHOSE-4.11:openshift-hyperkube-0:4.11.0-202306260054.p0.g990d55b.assembly.stream.el8.x86_64", "8Base-RHOSE-4.11:openshift-kuryr-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.src", "8Base-RHOSE-4.11:openshift-kuryr-cni-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-common-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:openshift-kuryr-controller-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.src", "8Base-RHOSE-4.11:podman-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-catatonit-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-debugsource-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-docker-2:4.0.2-7.rhaos4.11.el8.noarch", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-gvproxy-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-plugins-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-remote-debuginfo-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:podman-tests-2:4.0.2-7.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:python3-kuryr-kubernetes-0:4.11.0-202306280915.p0.gc732699.assembly.stream.el8.noarch", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.src", "8Base-RHOSE-4.11:runc-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debuginfo-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:runc-debugsource-3:1.1.2-2.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.src", "8Base-RHOSE-4.11:skopeo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debuginfo-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-debugsource-2:1.5.2-4.rhaos4.11.el8.x86_64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.aarch64", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.ppc64le", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.s390x", "8Base-RHOSE-4.11:skopeo-tests-2:1.5.2-4.rhaos4.11.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "golang: html/template: improper handling of JavaScript whitespace" } ] }
rhsa-2022_6714
Vulnerability from csaf_redhat
Published
2022-09-26 15:26
Modified
2024-12-17 22:03
Summary
Red Hat Security Advisory: RHACS 3.72 enhancement and security update
Notes
Topic
Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Release of RHACS 3.72 provides these changes:
New features
* Automatic removal of nonactive clusters from RHACS: RHACS provides the ability to configure your system to automatically remove nonactive clusters from RHACS so that you can monitor active clusters only.
* Support for unauthenticated email integration: RHACS now supports unauthenticated SMTP for email integrations. This is insecure and not recommended.
* Support for Quay robot accounts: RHACS now supports use of robot accounts in quay.io integrations. You can create robot accounts in Quay that allow you to share credentials for use in multiple repositories.
* Ability to view Dockerfile lines in images that introduced components with Common Vulnerabilities and Exposures (CVEs): In the Images view, under Image Findings, you can view individual lines in the Dockerfile that introduced the components that have been identified as containing CVEs.
* Network graph improvements: RHACS 3.72 includes some improvements to the Network Graph user interface.
Known issue
* RHACS shows the wrong severity when two severities exist for a single vulnerability in a single distribution. This issue occurs because RHACS scopes severities by namespace rather than component. There is no workaround. It is anticipated that an upcoming release will include a fix for this issue. (ROX-12527)
Bug fixes
* Before this update, the steps to configure OpenShift Container Platform OAuth for more than one URI were missing. The documentation has been revised to include instructions for configuring OAuth in OpenShift Container Platform to use more than one URI. For more information, see Creating additional routes for the OpenShift Container Platform OAuth server. (ROX-11296)
* Before this update, the autogenerated image integration, such as a Docker registry integration, for a cluster is not deleted when the cluster is removed from Central. This issue is fixed. (ROX-9398)
* Before this update, the Image OS policy criteria did not support regular expressions, or regex. However, the documentation indicated that regular expressions were supported. This issue is fixed by adding support for regular expressions for the Image OS policy criteria. (ROX-12301)
* Before this update, the syslog integration did not respect a configured TCP proxy. This is now fixed.
* Before this update, the scanner-db pod failed to start when a resource quota was set for the stackrox namespace, because the init-db container in the pod did not have any resources assigned to it. The init-db container for ScannerDB now specifies resource requests and limits that match the db container. (ROX-12291)
Notable technical changes
* Scanning support for Red Hat Enterprise Linux 9: RHEL 9 is now generally available (GA). RHACS 3.72 introduces support for analyzing images built with Red Hat Universal Base Image (UBI) 9 and Red Hat Enterprise Linux (RHEL) 9 RPMs for vulnerabilities.
* Policy for CVEs with fixable CVSS of 6 or greater disabled by default: Beginning with this release, the Fixable CVSS >= 6 and Privileged policy is no longer enabled by default for new RHACS installations. The configuration of this policy is not changed when upgrading an existing system. A new policy Privileged Containers with Important and Critical Fixable CVEs, which gives an alert for containers running in privileged mode that have important or critical fixable vulnerabilities, has been added.
Security Fix(es)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes new features and bug fixes.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Release of RHACS 3.72 provides these changes:\n\nNew features\n* Automatic removal of nonactive clusters from RHACS: RHACS provides the ability to configure your system to automatically remove nonactive clusters from RHACS so that you can monitor active clusters only. \n* Support for unauthenticated email integration: RHACS now supports unauthenticated SMTP for email integrations. This is insecure and not recommended.\n* Support for Quay robot accounts: RHACS now supports use of robot accounts in quay.io integrations. You can create robot accounts in Quay that allow you to share credentials for use in multiple repositories.\n* Ability to view Dockerfile lines in images that introduced components with Common Vulnerabilities and Exposures (CVEs): In the Images view, under Image Findings, you can view individual lines in the Dockerfile that introduced the components that have been identified as containing CVEs.\n* Network graph improvements: RHACS 3.72 includes some improvements to the Network Graph user interface.\n\nKnown issue\n* RHACS shows the wrong severity when two severities exist for a single vulnerability in a single distribution. This issue occurs because RHACS scopes severities by namespace rather than component. There is no workaround. It is anticipated that an upcoming release will include a fix for this issue. (ROX-12527)\n\nBug fixes\n* Before this update, the steps to configure OpenShift Container Platform OAuth for more than one URI were missing. The documentation has been revised to include instructions for configuring OAuth in OpenShift Container Platform to use more than one URI. For more information, see Creating additional routes for the OpenShift Container Platform OAuth server. (ROX-11296)\n* Before this update, the autogenerated image integration, such as a Docker registry integration, for a cluster is not deleted when the cluster is removed from Central. This issue is fixed. (ROX-9398)\n* Before this update, the Image OS policy criteria did not support regular expressions, or regex. However, the documentation indicated that regular expressions were supported. This issue is fixed by adding support for regular expressions for the Image OS policy criteria. (ROX-12301)\n* Before this update, the syslog integration did not respect a configured TCP proxy. This is now fixed.\n* Before this update, the scanner-db pod failed to start when a resource quota was set for the stackrox namespace, because the init-db container in the pod did not have any resources assigned to it. The init-db container for ScannerDB now specifies resource requests and limits that match the db container. (ROX-12291)\n\nNotable technical changes\n* Scanning support for Red Hat Enterprise Linux 9: RHEL 9 is now generally available (GA). RHACS 3.72 introduces support for analyzing images built with Red Hat Universal Base Image (UBI) 9 and Red Hat Enterprise Linux (RHEL) 9 RPMs for vulnerabilities.\n* Policy for CVEs with fixable CVSS of 6 or greater disabled by default: Beginning with this release, the Fixable CVSS \u003e= 6 and Privileged policy is no longer enabled by default for new RHACS installations. The configuration of this policy is not changed when upgrading an existing system. A new policy Privileged Containers with Important and Critical Fixable CVEs, which gives an alert for containers running in privileged mode that have important or critical fixable vulnerabilities, has been added.\n\nSecurity Fix(es)\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n* golang: syscall: faccessat checks wrong group (CVE-2022-29526)\n* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6714", "url": "https://access.redhat.com/errata/RHSA-2022:6714" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.openshift.com/acs/3.72/release_notes/372-release-notes.html", "url": "https://docs.openshift.com/acs/3.72/release_notes/372-release-notes.html" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "ROX-12799", "url": "https://issues.redhat.com/browse/ROX-12799" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6714.json" } ], "title": "Red Hat Security Advisory: RHACS 3.72 enhancement and security update", "tracking": { "current_release_date": "2024-12-17T22:03:06+00:00", "generator": { "date": "2024-12-17T22:03:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6714", "initial_release_date": "2022-09-26T15:26:11+00:00", "revision_history": [ { "date": "2022-09-26T15:26:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-26T15:26:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:03:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHACS 3.72 for RHEL 8", "product": { "name": "RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72", "product_identification_helper": { "cpe": "cpe:/a:redhat:advanced_cluster_security:3.72::el8" } } } ], "category": "product_family", "name": "Red Hat Advanced Cluster Security for Kubernetes" }, { "branches": [ { "category": "product_version", "name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "product": { "name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "product_id": "advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-rhel8\u0026tag=3.72.0-3" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "product": { "name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "product_id": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-collector-slim-rhel8\u0026tag=3.72.0-2" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "product": { "name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "product_id": "advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-docs-rhel8\u0026tag=3.72.0-3" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "product": { "name": "advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "product_id": "advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-main-rhel8\u0026tag=3.72.0-3" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "product": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "product_id": "advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-operator-bundle\u0026tag=3.72.0-3" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "product": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "product_id": "advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-rhel8-operator\u0026tag=3.72.0-3" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "product": { "name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "product_id": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-roxctl-rhel8\u0026tag=3.72.0-4" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "product": { "name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "product_id": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-rhel8\u0026tag=3.72.0-3" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "product": { "name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "product_id": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-rhel8\u0026tag=3.72.0-3" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "product": { "name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "product_id": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-db-slim-rhel8\u0026tag=3.72.0-2" } } }, { "category": "product_version", "name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64", "product": { "name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64", "product_id": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64", "product_identification_helper": { "purl": "pkg:oci/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1?arch=amd64\u0026repository_url=registry.redhat.io/advanced-cluster-security/rhacs-scanner-slim-rhel8\u0026tag=3.72.0-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64" }, "product_reference": "advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64" }, "product_reference": "advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64" }, "product_reference": "advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64" }, "product_reference": "advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64" }, "product_reference": "advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64" }, "product_reference": "advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64" }, "product_reference": "advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64" }, "product_reference": "advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" }, "product_reference": "advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64" }, "product_reference": "advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" }, { "category": "default_component_of", "full_product_name": { "name": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64 as a component of RHACS 3.72 for RHEL 8", "product_id": "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" }, "product_reference": "advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64", "relates_to_product_reference": "8Base-RHACS-3.72" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "known_not_affected": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T15:26:11+00:00", "details": "To take advantage of the new features, bug fixes, and enhancements in RHACS 3.72 you are advised to upgrade to RHACS 3.72.0.", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6714" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "known_not_affected": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T15:26:11+00:00", "details": "To take advantage of the new features, bug fixes, and enhancements in RHACS 3.72 you are advised to upgrade to RHACS 3.72.0.", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6714" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "known_not_affected": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T15:26:11+00:00", "details": "To take advantage of the new features, bug fixes, and enhancements in RHACS 3.72 you are advised to upgrade to RHACS 3.72.0.", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6714" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "acknowledgments": [ { "names": [ "Jo\u00ebl G\u00e4hwiler" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-29526", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-05-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2084085" } ], "notes": [ { "category": "description", "text": "A flaw was found in the syscall.Faccessat function when calling a process by checking the group. This flaw allows an attacker to check the process group permissions rather than a member of the file\u0027s group, affecting system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: syscall: faccessat checks wrong group", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "known_not_affected": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-29526" }, { "category": "external", "summary": "RHBZ#2084085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2084085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-29526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29526" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU", "url": "https://groups.google.com/g/golang-announce/c/Y5qrqw_lWdU" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T15:26:11+00:00", "details": "To take advantage of the new features, bug fixes, and enhancements in RHACS 3.72 you are advised to upgrade to RHACS 3.72.0.", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6714" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: syscall: faccessat checks wrong group" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "known_not_affected": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-26T15:26:11+00:00", "details": "To take advantage of the new features, bug fixes, and enhancements in RHACS 3.72 you are advised to upgrade to RHACS 3.72.0.", "product_ids": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6714" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-rhel8@sha256:2083d2a25f1954186a0b06ddde11215b1f21ac819f2fadb5278f2c62aad5324d_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-collector-slim-rhel8@sha256:abeaab1e57851f3883af18464d85e776c83778a79bdd39e97d67fc05a0bbe87b_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-docs-rhel8@sha256:a17be9f88785c32bb6ab598072bae369f392b80037500947af5cd3f174daafe4_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-main-rhel8@sha256:142aeebfd057b8bf0bcc949190887a2fbc5bf160aa38e7ed70baaccf4f1438c3_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-operator-bundle@sha256:9ec13da5353f1031edc8b84ee17f00fd42c59253b2f402eec0dc5744fac1cbf5_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-rhel8-operator@sha256:12012f57ce5f5a3198288b21761b046a0090335d36eb5a6425ab547b04a82790_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-roxctl-rhel8@sha256:aa63f1ec9768107ef8ee6ca951589d3aba4abd0b6ebac17fd730360f06b25f36_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-rhel8@sha256:1e1598484dbf95e45e2b6798dc82d5d0f78a82fff0025d61736c7fdc014e915e_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-db-slim-rhel8@sha256:8ddb34c4d25fce6e6686a51a3f8482152a48e9f9154a3142983bcdfde66e9a85_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-rhel8@sha256:39076f8d7502262d78176bda06dfa5ed69bd43a42a5cdd431434bad30dd844ba_amd64", "8Base-RHACS-3.72:advanced-cluster-security/rhacs-scanner-slim-rhel8@sha256:dd738be01a9a078d457e76cf54e2e88d112db971542a168cd4b016190cdf00e1_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" } ] }
rhsa-2022_8750
Vulnerability from csaf_redhat
Published
2022-12-01 21:09
Modified
2024-12-17 22:07
Summary
Red Hat Security Advisory: OpenShift Virtualization 4.11.1 security and bug fix update
Notes
Topic
Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.
Security Fix(es):
* golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561)
* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)
* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)
* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Cloning a Block DV to VM with Filesystem with not big enough size comes to endless loop - using pvc api (BZ#2033191)
* Restart of VM Pod causes SSH keys to be regenerated within VM (BZ#2087177)
* Import gzipped raw file causes image to be downloaded and uncompressed to TMPDIR (BZ#2089391)
* [4.11] VM Snapshot Restore hangs indefinitely when backed by a snapshotclass (BZ#2098225)
* Fedora version in DataImportCrons is not 'latest' (BZ#2102694)
* [4.11] Cloned VM's snapshot restore fails if the source VM disk is deleted (BZ#2109407)
* CNV introduces a compliance check fail in "ocp4-moderate" profile - routes-protected-by-tls (BZ#2110562)
* Nightly build: v4.11.0-578: index format was changed in 4.11 to file-based instead of sqlite-based (BZ#2112643)
* Unable to start windows VMs on PSI setups (BZ#2115371)
* [4.11.1]virt-launcher cannot be started on OCP 4.12 due to PodSecurity restricted:v1.24 (BZ#2128997)
* Mark Windows 11 as TechPreview (BZ#2129013)
* 4.11.1 rpms (BZ#2139453)
This advisory contains the following OpenShift Virtualization 4.11.1 images.
RHEL-8-CNV-4.11
virt-cdi-operator-container-v4.11.1-5
virt-cdi-uploadserver-container-v4.11.1-5
virt-cdi-apiserver-container-v4.11.1-5
virt-cdi-importer-container-v4.11.1-5
virt-cdi-controller-container-v4.11.1-5
virt-cdi-cloner-container-v4.11.1-5
virt-cdi-uploadproxy-container-v4.11.1-5
checkup-framework-container-v4.11.1-3
kubevirt-tekton-tasks-wait-for-vmi-status-container-v4.11.1-7
kubevirt-tekton-tasks-create-datavolume-container-v4.11.1-7
kubevirt-template-validator-container-v4.11.1-4
virt-handler-container-v4.11.1-5
hostpath-provisioner-operator-container-v4.11.1-4
virt-api-container-v4.11.1-5
vm-network-latency-checkup-container-v4.11.1-3
cluster-network-addons-operator-container-v4.11.1-5
virtio-win-container-v4.11.1-4
virt-launcher-container-v4.11.1-5
ovs-cni-marker-container-v4.11.1-5
hyperconverged-cluster-webhook-container-v4.11.1-7
virt-controller-container-v4.11.1-5
virt-artifacts-server-container-v4.11.1-5
kubevirt-tekton-tasks-modify-vm-template-container-v4.11.1-7
kubevirt-tekton-tasks-disk-virt-customize-container-v4.11.1-7
libguestfs-tools-container-v4.11.1-5
hostpath-provisioner-container-v4.11.1-4
kubevirt-tekton-tasks-disk-virt-sysprep-container-v4.11.1-7
kubevirt-tekton-tasks-copy-template-container-v4.11.1-7
cnv-containernetworking-plugins-container-v4.11.1-5
bridge-marker-container-v4.11.1-5
virt-operator-container-v4.11.1-5
hostpath-csi-driver-container-v4.11.1-4
kubevirt-tekton-tasks-create-vm-from-template-container-v4.11.1-7
kubemacpool-container-v4.11.1-5
hyperconverged-cluster-operator-container-v4.11.1-7
kubevirt-ssp-operator-container-v4.11.1-4
ovs-cni-plugin-container-v4.11.1-5
kubevirt-tekton-tasks-cleanup-vm-container-v4.11.1-7
kubevirt-tekton-tasks-operator-container-v4.11.1-2
cnv-must-gather-container-v4.11.1-8
kubevirt-console-plugin-container-v4.11.1-9
hco-bundle-registry-container-v4.11.1-49
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.11.1 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nSecurity Fix(es):\n\n* golang: out-of-bounds read in golang.org/x/text/language leads to DoS (CVE-2021-38561)\n\n* golang: encoding/pem: fix stack overflow in Decode (CVE-2022-24675)\n\n* golang: regexp: stack exhaustion via a deeply nested expression (CVE-2022-24921)\n\n* golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\n\n* golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Cloning a Block DV to VM with Filesystem with not big enough size comes to endless loop - using pvc api (BZ#2033191)\n\n* Restart of VM Pod causes SSH keys to be regenerated within VM (BZ#2087177)\n\n* Import gzipped raw file causes image to be downloaded and uncompressed to TMPDIR (BZ#2089391)\n\n* [4.11] VM Snapshot Restore hangs indefinitely when backed by a snapshotclass (BZ#2098225)\n\n* Fedora version in DataImportCrons is not \u0027latest\u0027 (BZ#2102694)\n\n* [4.11] Cloned VM\u0027s snapshot restore fails if the source VM disk is deleted (BZ#2109407)\n\n* CNV introduces a compliance check fail in \"ocp4-moderate\" profile - routes-protected-by-tls (BZ#2110562)\n\n* Nightly build: v4.11.0-578: index format was changed in 4.11 to file-based instead of sqlite-based (BZ#2112643)\n\n* Unable to start windows VMs on PSI setups (BZ#2115371)\n\n* [4.11.1]virt-launcher cannot be started on OCP 4.12 due to PodSecurity restricted:v1.24 (BZ#2128997)\n\n* Mark Windows 11 as TechPreview (BZ#2129013)\n\n* 4.11.1 rpms (BZ#2139453)\n\nThis advisory contains the following OpenShift Virtualization 4.11.1 images.\n\nRHEL-8-CNV-4.11\n\nvirt-cdi-operator-container-v4.11.1-5\nvirt-cdi-uploadserver-container-v4.11.1-5\nvirt-cdi-apiserver-container-v4.11.1-5\nvirt-cdi-importer-container-v4.11.1-5\nvirt-cdi-controller-container-v4.11.1-5\nvirt-cdi-cloner-container-v4.11.1-5\nvirt-cdi-uploadproxy-container-v4.11.1-5\ncheckup-framework-container-v4.11.1-3\nkubevirt-tekton-tasks-wait-for-vmi-status-container-v4.11.1-7\nkubevirt-tekton-tasks-create-datavolume-container-v4.11.1-7\nkubevirt-template-validator-container-v4.11.1-4\nvirt-handler-container-v4.11.1-5\nhostpath-provisioner-operator-container-v4.11.1-4\nvirt-api-container-v4.11.1-5\nvm-network-latency-checkup-container-v4.11.1-3\ncluster-network-addons-operator-container-v4.11.1-5\nvirtio-win-container-v4.11.1-4\nvirt-launcher-container-v4.11.1-5\novs-cni-marker-container-v4.11.1-5\nhyperconverged-cluster-webhook-container-v4.11.1-7\nvirt-controller-container-v4.11.1-5\nvirt-artifacts-server-container-v4.11.1-5\nkubevirt-tekton-tasks-modify-vm-template-container-v4.11.1-7\nkubevirt-tekton-tasks-disk-virt-customize-container-v4.11.1-7\nlibguestfs-tools-container-v4.11.1-5\nhostpath-provisioner-container-v4.11.1-4\nkubevirt-tekton-tasks-disk-virt-sysprep-container-v4.11.1-7\nkubevirt-tekton-tasks-copy-template-container-v4.11.1-7\ncnv-containernetworking-plugins-container-v4.11.1-5\nbridge-marker-container-v4.11.1-5\nvirt-operator-container-v4.11.1-5\nhostpath-csi-driver-container-v4.11.1-4\nkubevirt-tekton-tasks-create-vm-from-template-container-v4.11.1-7\nkubemacpool-container-v4.11.1-5\nhyperconverged-cluster-operator-container-v4.11.1-7\nkubevirt-ssp-operator-container-v4.11.1-4\novs-cni-plugin-container-v4.11.1-5\nkubevirt-tekton-tasks-cleanup-vm-container-v4.11.1-7\nkubevirt-tekton-tasks-operator-container-v4.11.1-2\ncnv-must-gather-container-v4.11.1-8\nkubevirt-console-plugin-container-v4.11.1-9\nhco-bundle-registry-container-v4.11.1-49", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8750", "url": "https://access.redhat.com/errata/RHSA-2022:8750" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2033191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033191" }, { "category": "external", "summary": "2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "2070772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070772" }, { "category": "external", "summary": "2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2087177", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087177" }, { "category": "external", "summary": "2089391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2089391" }, { "category": "external", "summary": "2091856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2091856" }, { "category": "external", "summary": "2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "2098225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2098225" }, { "category": "external", "summary": "2100495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100495" }, { "category": "external", "summary": "2102694", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2102694" }, { "category": "external", "summary": "2109407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2109407" }, { "category": "external", "summary": "2110562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110562" }, { "category": "external", "summary": "2112643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2112643" }, { "category": "external", "summary": "2115371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115371" }, { "category": "external", "summary": "2119613", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2119613" }, { "category": "external", "summary": "2128554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128554" }, { "category": "external", "summary": "2128872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128872" }, { "category": "external", "summary": "2128997", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128997" }, { "category": "external", "summary": "2129013", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129013" }, { "category": "external", "summary": "2129235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129235" }, { "category": "external", "summary": "2134668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134668" }, { "category": "external", "summary": "2139453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139453" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8750.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.11.1 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:07:19+00:00", "generator": { "date": "2024-12-17T22:07:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:8750", "initial_release_date": "2022-12-01T21:09:40+00:00", "revision_history": [ { "date": "2022-12-01T21:09:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-12-01T21:09:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:07:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.11 for RHEL 8", "product": { "name": "CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.11::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "product": { "name": "container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "product_id": "container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker\u0026tag=v4.11.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "product": { "name": "container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "product_id": "container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "product_identification_helper": { "purl": "pkg:oci/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/checkup-framework\u0026tag=v4.11.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator\u0026tag=v4.11.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins\u0026tag=v4.11.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel8\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "product_id": "container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry\u0026tag=v4.11.1-92" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel8\u0026tag=v4.11.1-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver\u0026tag=v4.11.1-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8\u0026tag=v4.11.1-5" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel8-operator\u0026tag=v4.11.1-6" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator\u0026tag=v4.11.1-10" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel8\u0026tag=v4.11.1-10" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "product": { "name": "container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "product_id": "container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool\u0026tag=v4.11.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin\u0026tag=v4.11.1-17" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator\u0026tag=v4.11.1-4" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status\u0026tag=v4.11.1-15" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "product_id": "container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools\u0026tag=v4.11.1-11" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "product": { "name": "container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "product_id": "container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-marker\u0026tag=v4.11.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin\u0026tag=v4.11.1-8" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "product": { "name": "container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "product_id": "container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api\u0026tag=v4.11.1-11" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "product_id": "container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server\u0026tag=v4.11.1-11" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "product_id": "container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "product_id": "container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "product_id": "container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver\u0026tag=v4.11.1-7" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "product": { "name": "container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "product_id": "container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller\u0026tag=v4.11.1-11" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "product": { "name": "container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "product_id": "container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler\u0026tag=v4.11.1-11" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "product": { "name": "container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "product_id": "container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win\u0026tag=v4.11.1-6" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "product": { "name": "container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "product_id": "container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher\u0026tag=v4.11.1-11" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "product": { "name": "container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "product_id": "container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator\u0026tag=v4.11.1-11" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup\u0026tag=v4.11.1-8" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64" }, "product_reference": "container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64" }, "product_reference": "container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64" }, "product_reference": "container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64" }, "product_reference": "container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64" }, "product_reference": "container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64" }, "product_reference": "container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64" }, "product_reference": "container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64" }, "product_reference": "container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64" }, "product_reference": "container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "relates_to_product_reference": "8Base-CNV-4.11" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64 as a component of CNV 4.11 for RHEL 8", "product_id": "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64", "relates_to_product_reference": "8Base-CNV-4.11" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-38561", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-06-23T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2100495" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows an attacker to cause applications using this package to parse untrusted input data to crash, leading to a denial of service of the affected component.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: out-of-bounds read in golang.org/x/text/language leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw may be triggered only by accepting untrusted user input to the vulnerable golang\u0027s library. The overall DoS attack vector depends directly on how the library\u0027s input is exposed by the consuming application, thus Red Hat rates impact as Moderate.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) 2.5 version, the registration-operator, lighthouse-coredns, lighthouse-agent, gatekeeper-operator, and discovery-operator components are affected by this flaw, but the rest of the components are using an already patched version and are unaffected. For 2.4 and previous versions of Red Hat Advanced Cluster Management for Kubernetes (RHACM), most of the components are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38561" }, { "category": "external", "summary": "RHBZ#2100495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38561", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38561" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2021-0113", "url": "https://pkg.go.dev/vuln/GO-2021-0113" } ], "release_date": "2021-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-01T21:09:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: out-of-bounds read in golang.org/x/text/language leads to DoS" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077688" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in Golang\u0027s library encoding/pem. This flaw allows an attacker to use a large PEM input (more than 5 MB), causing a stack overflow in Decode, which leads to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/pem: fix stack overflow in Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope.\n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24675" }, { "category": "external", "summary": "RHBZ#2077688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24675" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-01T21:09:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: encoding/pem: fix stack overflow in Decode" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064857" } ], "notes": [ { "category": "description", "text": "A stack overflow flaw was found in Golang\u0027s regexp module, which can crash the runtime if the application using regexp accepts very long or arbitrarily long regexps from untrusted sources that have sufficient nesting depths. To exploit this vulnerability, an attacker would need to send large regexps with deep nesting to the application. Triggering this flaw leads to a crash of the runtime, which causes a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp: stack exhaustion via a deeply nested expression", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as a Moderate impact flaw because the exploitation of this flaw requires that an affected application accept arbitrarily long regexps from untrusted sources, which has inherent risks (even without this flaw), especially involving impacts to application availability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24921" }, { "category": "external", "summary": "RHBZ#2064857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24921", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24921" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk", "url": "https://groups.google.com/g/golang-announce/c/RP1hfrBYVuk" } ], "release_date": "2022-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-01T21:09:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp: stack exhaustion via a deeply nested expression" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-01T21:09:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30629", "cwe": { "id": "CWE-331", "name": "Insufficient Entropy" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092793" } ], "notes": [ { "category": "description", "text": "A flaw was found in the crypto/tls golang package. When session tickets are generated by crypto/tls, it is missing the ticket expiration. This issue may allow an attacker to observe the TLS handshakes to correlate successive connections during session resumption.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/tls: session tickets lack random ticket_age_add", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64" ], "known_not_affected": [ "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30629" }, { "category": "external", "summary": "RHBZ#2092793", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092793" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30629" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg", "url": "https://groups.google.com/g/golang-announce/c/TzIC9-t8Ytg" } ], "release_date": "2022-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-12-01T21:09:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8750" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-CNV-4.11:container-native-virtualization/bridge-marker@sha256:59e80e29aef53d75cd40d526a2f033fb7aa1ac649da1a9e76b64d466257176cd_amd64", "8Base-CNV-4.11:container-native-virtualization/checkup-framework@sha256:2370dd32b3e15b4261ed6267d5233ff549bd58bf5700edecc4062cce4a2bc302_amd64", "8Base-CNV-4.11:container-native-virtualization/cluster-network-addons-operator@sha256:62bc5bdbecd1c2b15d254ef0f6754c155a3dff53178e3b7e48b0e064d82e0ebe_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-containernetworking-plugins@sha256:37cbda49804ccc5626216e3a4f0fde8d94d93111e49b2b9256cd9da07985681e_amd64", "8Base-CNV-4.11:container-native-virtualization/cnv-must-gather-rhel8@sha256:288403025b7d6f5e1ee9d32bf23efc07d63ab90ad4f9f558949dfac44f6c3abc_amd64", "8Base-CNV-4.11:container-native-virtualization/hco-bundle-registry@sha256:2ed82d656fb357c2eafdbf5e3436a27c6c27e81ff9a78e6108d624b0e5ac4df2_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver-rhel8@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-csi-driver@sha256:db4873121d15ac4ac438a101a7b7c347769922311d53e8d06b02c41e3b62ecac_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8-operator@sha256:42ed6288a8444726a7addb617bdb53ccff36090d2b22f4499d4b2ccc51009b17_amd64", "8Base-CNV-4.11:container-native-virtualization/hostpath-provisioner-rhel8@sha256:f8f67f5e67ea99dda1445257ceba9e68614efe9c8d2fc257d88ce6bcf56ec40f_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-operator@sha256:98be2c9b4d41c8e35067318d01a76a747513652fcbd41ba38070b49ab1858e6c_amd64", "8Base-CNV-4.11:container-native-virtualization/hyperconverged-cluster-webhook-rhel8@sha256:45c90ed991c655126f8a9acb909d1e5607e224ec6412a015308794e5b02fe320_amd64", "8Base-CNV-4.11:container-native-virtualization/kubemacpool@sha256:6f4c35e008f158160a28419568a1db2ce9bb3a2e1d3d2eb882fa0499be7dedd0_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-console-plugin@sha256:12f988f14cd8a4f7d5fa175a488435ad571091e2544670a0509fe1027ba71cfb_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-ssp-operator@sha256:b2c001156b0abeb4e2c890927fb935bc43c20300125b7add856302dfcea7052c_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm@sha256:f80bccd1ba7d922113f9f3a1506d01dd7d07ac8d70ef7c72eae497a368b6c303_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-copy-template@sha256:295767815690a79bb3b08895ab8937e322769773ad4cf7a305229ab29ccea897_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume@sha256:3e3a30a00b367480d3182820ba11e366d87b44ff1e626f9025ddd2c612d78e47_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template@sha256:4a5362a1fa6fc22344231321616b0f5e1cec7152c73bf0d00a36df62448076ee_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize@sha256:fffeced76624d73cb2fd19919726886d28fd1bf4ce22549ce0ca84ed972b9e73_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep@sha256:4e0d47644f1f44e1f01902691edce9e27acfa1aeb5f2de98439acfea7596c2e9_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template@sha256:53e110e700707e9f876d08a68240b6841ba5932e32b18ace1f9b8be1e575d954_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-operator@sha256:f854b68b7443c4ed87e50132aa776e1b60bd71e888cee4e181840667858b7a90_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status@sha256:b55e6949adf047224f78d0eba66a5b64c787719f4236a4b4feab268071f0c015_amd64", "8Base-CNV-4.11:container-native-virtualization/kubevirt-template-validator@sha256:f3b8bdc5905143bcfe825ceb633ed04219913ebff04edaabe019810771306578_amd64", "8Base-CNV-4.11:container-native-virtualization/libguestfs-tools@sha256:d244c934a8209d4bfd04f42fee30ec456078a1db61f1720d11c745cc76ab3e1d_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-marker@sha256:7109aa0773b2a019fc4e981009100b94b7adb89119be585f9a577b258af277b2_amd64", "8Base-CNV-4.11:container-native-virtualization/ovs-cni-plugin@sha256:10baab1fb06b0afbf4c790e24c6cea12516c1f4e047c9515309af20ef45e6c01_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-api@sha256:a66fb987f6eca11f2922dc3ef5e199ef12817bac071d033829f01a3dcb2c4e14_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-artifacts-server@sha256:ef16ccd7b5928288b84e16dbc8e5e3c83716174d98b414de7d8c98f4d780fa48_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-apiserver@sha256:3fbe2cf982203ad1565faf3dfdff2131a95754fa1924bc4540ef16a8c6a92996_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-cloner@sha256:6570c84c760ddc023cc254c252d8a7a986d50e9dffb09cb56db0334f08454965_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-controller@sha256:23f99683fc40c258ffa809f6e4e97835d9506247f4dc35640275c365d54b95c0_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-importer@sha256:171e69c1cf17c27b2eb69e6411b50e616366e5c188dd25baeade3c634c1425e4_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-operator@sha256:6acb6fdc85de481f0ec834646760701d1351eecfb72ecacd2393509d84f07c1f_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadproxy@sha256:e33e0ed610af88df4a2901c0b78aeb2e174d43ba60c7d7982b7c78b2f4545846_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-cdi-uploadserver@sha256:17d7ef4fd170b41bd6c0eaed374d591ab4e816d8c7d9ba5afa3d97ddd97b1521_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-controller@sha256:834c84710fa4b61b5797681e538723dda5962fc06484c092dfebb28d7ea4fd6e_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-handler@sha256:5232ce9a3704e6be8bce6bccddb234275afdaaf655a239cca642d2afc7a583ba_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-launcher@sha256:9cbbc3692cdcc0f8552a5de7233e5c43a3f9e56b6dc93af1c7c8bc3ccfed9aaf_amd64", "8Base-CNV-4.11:container-native-virtualization/virt-operator@sha256:4f91d8c011681951daa86ef1f9293fbfd3d9cc4eaa4746761ba1c3fc41149bb0_amd64", "8Base-CNV-4.11:container-native-virtualization/virtio-win@sha256:1a0ba39da4dc899ba8c1f13acb1f978f4c794a99163ba4935e4975cad6610e70_amd64", "8Base-CNV-4.11:container-native-virtualization/vm-network-latency-checkup@sha256:6fd6c7b974eabe5a710b1fa2b3aaf783fe3951112b42a0156743cb16a033b700_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: crypto/tls: session tickets lack random ticket_age_add" } ] }
ICSA-23-047-04
Vulnerability from csaf_cisa
Published
2023-02-20 20:44
Modified
2023-02-20 20:44
Summary
Siemens Brownfield Connectivity Gateway
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could lead to a denial-of-service condition.
Critical infrastructure sectors
Critical Manufacturing
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability
No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could lead to a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-744259.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-047-04 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-047-04.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-047-04 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-04" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/Recommended-Practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://cisa.gov/ics" }, { "category": "external", "summary": "SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" }, { "category": "external", "summary": "SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-744259.txt" } ], "title": "Siemens Brownfield Connectivity Gateway", "tracking": { "current_release_date": "2023-02-20T20:44:30.574634Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-047-04", "initial_release_date": "2023-02-20T20:44:30.574634Z", "revision_history": [ { "date": "2023-02-20T20:44:30.574634Z", "legacy_version": "1", "number": "1", "summary": "CSAF Creation Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.10", "product": { "name": "Brownfield Connectivity - Gateway", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "V1.10.1", "product": { "name": "Brownfield Connectivity - Gateway", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Brownfield Connectivity - Gateway" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41771", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Go before 1.16.10 and 1.17.x before 1.17.3 allows an archive/zip Reader.Open panic via a crafted ZIP archive containing an invalid name or an empty filename field.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41772" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44716" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44717" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-44717" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24675" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24921" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-24921" }, { "cve": "CVE-2022-27536", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Certificate.Verify in crypto/x509 in Go 1.18.x before 1.18.1 can be caused to panic on macOS when presented with certain malformed certificates. This allows a remote TLS server to cause a TLS client to panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27536" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28327" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2022-28327" } ] }
icsa-23-047-04
Vulnerability from csaf_cisa
Published
2023-02-20 20:44
Modified
2023-02-20 20:44
Summary
Siemens Brownfield Connectivity Gateway
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
Successful exploitation of these vulnerabilities could lead to a denial-of-service condition.
Critical infrastructure sectors
Critical Manufacturing
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices
Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Exploitability
No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could lead to a denial-of-service condition.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities. These vulnerabilities are exploitable remotely. These vulnerabilities have low attack complexity.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-744259.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-047-04 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-047-04.json" }, { "category": "self", "summary": "ICS Advisory ICSA-23-047-04 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-04" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/Recommended-Practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://cisa.gov/ics" }, { "category": "external", "summary": "SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" }, { "category": "external", "summary": "SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-744259.txt" } ], "title": "Siemens Brownfield Connectivity Gateway", "tracking": { "current_release_date": "2023-02-20T20:44:30.574634Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-23-047-04", "initial_release_date": "2023-02-20T20:44:30.574634Z", "revision_history": [ { "date": "2023-02-20T20:44:30.574634Z", "legacy_version": "1", "number": "1", "summary": "CSAF Creation Date" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c V1.10", "product": { "name": "Brownfield Connectivity - Gateway", "product_id": "CSAFPID-0001" } }, { "category": "product_version_range", "name": "V1.10.1", "product": { "name": "Brownfield Connectivity - Gateway", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Brownfield Connectivity - Gateway" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-41771", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 Accesses a Memory Location After the End of a Buffer, aka an out-of-bounds slice situation.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41771" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "Go before 1.16.10 and 1.17.x before 1.17.3 allows an archive/zip Reader.Open panic via a crafted ZIP archive containing an invalid name or an empty filename field.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-41772" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-41772" }, { "cve": "CVE-2021-44716", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44716" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "Go before 1.16.12 and 1.17.x before 1.17.5 on UNIX allows write operations to an unintended file or unintended network connection as a consequence of erroneous closing of file descriptor 0 after file-descriptor exhaustion.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44717" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2021-44717" }, { "cve": "CVE-2022-24675", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "summary", "text": "encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24675" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "summary", "text": "regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-24921" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2022-24921" }, { "cve": "CVE-2022-27536", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "Certificate.Verify in crypto/x509 in Go 1.18.x before 1.18.1 can be caused to panic on macOS when presented with certain malformed certificates. This allows a remote TLS server to cause a TLS client to panic.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-27536" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-28327" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "vendor_fix", "details": "Update to V1.11 or later version\nContact customer support to obtain the update \u003chttps://support.industry.siemens.com/cs/de/de/view/109801700\u003e", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2022-28327" } ] }
wid-sec-w-2022-0515
Vulnerability from csaf_certbund
Published
2022-06-29 22:00
Modified
2023-06-08 22:00
Summary
IBM Spectrum Protect: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Spectrum Protect ist eine zentralisierte Backuplösung für Systeme im Netzwerk.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:32.847+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-28327" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
wid-sec-w-2023-1424
Vulnerability from csaf_certbund
Published
2023-06-12 22:00
Modified
2023-06-12 22:00
Summary
Xerox FreeFlow Print Server für Solaris: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1424 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1424.json" }, { "category": "self", "summary": "WID-SEC-2023-1424 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1424" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-06-12", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/06/Xerox-Security-Bulletin-XRX23-009-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server f\u00fcr Solaris: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:30:41.322+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1424", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28176", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28176" }, { "cve": "CVE-2023-28164", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28164" }, { "cve": "CVE-2023-28163", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28163" }, { "cve": "CVE-2023-28162", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28162" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-25752", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25752" }, { "cve": "CVE-2023-25751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25751" }, { "cve": "CVE-2023-25746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25746" }, { "cve": "CVE-2023-25744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25744" }, { "cve": "CVE-2023-25743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25743" }, { "cve": "CVE-2023-25742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25742" }, { "cve": "CVE-2023-25739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25739" }, { "cve": "CVE-2023-25738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25738" }, { "cve": "CVE-2023-25737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25737" }, { "cve": "CVE-2023-25735", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25735" }, { "cve": "CVE-2023-25734", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25734" }, { "cve": "CVE-2023-25732", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25732" }, { "cve": "CVE-2023-25730", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25730" }, { "cve": "CVE-2023-25729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25729" }, { "cve": "CVE-2023-25728", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25728" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-24807", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24807" }, { "cve": "CVE-2023-24580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24580" }, { "cve": "CVE-2023-23969", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23969" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-23936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23936" }, { "cve": "CVE-2023-23920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23920" }, { "cve": "CVE-2023-23919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23919" }, { "cve": "CVE-2023-23918", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23918" }, { "cve": "CVE-2023-23605", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23605" }, { "cve": "CVE-2023-23603", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23603" }, { "cve": "CVE-2023-23602", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23602" }, { "cve": "CVE-2023-23601", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23601" }, { "cve": "CVE-2023-23599", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23599" }, { "cve": "CVE-2023-23598", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23598" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-22003", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22003" }, { "cve": "CVE-2023-21985", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21985" }, { "cve": "CVE-2023-21984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21984" }, { "cve": "CVE-2023-21928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21928" }, { "cve": "CVE-2023-21896", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21896" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-0804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0804" }, { "cve": "CVE-2023-0803", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0803" }, { "cve": "CVE-2023-0802", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0802" }, { "cve": "CVE-2023-0801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0801" }, { "cve": "CVE-2023-0800", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0800" }, { "cve": "CVE-2023-0799", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0799" }, { "cve": "CVE-2023-0798", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0798" }, { "cve": "CVE-2023-0797", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0797" }, { "cve": "CVE-2023-0796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0796" }, { "cve": "CVE-2023-0795", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0795" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-0662", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0662" }, { "cve": "CVE-2023-0616", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0616" }, { "cve": "CVE-2023-0568", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0568" }, { "cve": "CVE-2023-0567", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0567" }, { "cve": "CVE-2023-0430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0430" }, { "cve": "CVE-2023-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0417" }, { "cve": "CVE-2023-0416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0416" }, { "cve": "CVE-2023-0415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0415" }, { "cve": "CVE-2023-0414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0414" }, { "cve": "CVE-2023-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0413" }, { "cve": "CVE-2023-0412", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0412" }, { "cve": "CVE-2023-0411", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0411" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-46877", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46877" }, { "cve": "CVE-2022-46874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46874" }, { "cve": "CVE-2022-46871", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46871" }, { "cve": "CVE-2022-46344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46344" }, { "cve": "CVE-2022-46343", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46343" }, { "cve": "CVE-2022-46342", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46342" }, { "cve": "CVE-2022-46341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46341" }, { "cve": "CVE-2022-46340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46340" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-45199", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45199" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-4345", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4345" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4283", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4283" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40898" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-39253", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-39253" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-38784", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-38784" }, { "cve": "CVE-2022-38171", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-38171" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-36114", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36114" }, { "cve": "CVE-2022-36113", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36113" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3256", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3256" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-2929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2929" }, { "cve": "CVE-2022-2928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2928" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-28331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28331" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27337", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27337" }, { "cve": "CVE-2022-25255", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-25255" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-24963", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-24963" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-21515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21515" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1122", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1122" }, { "cve": "CVE-2022-0718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-0718" }, { "cve": "CVE-2021-37750", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-37519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-37519" }, { "cve": "CVE-2021-35940", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-35940" }, { "cve": "CVE-2021-30860", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-30860" }, { "cve": "CVE-2021-29338", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-29338" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-12613", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2017-12613" }, { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2006-20001" } ] }
WID-SEC-W-2023-1424
Vulnerability from csaf_certbund
Published
2023-06-12 22:00
Modified
2023-06-12 22:00
Summary
Xerox FreeFlow Print Server für Solaris: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1424 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1424.json" }, { "category": "self", "summary": "WID-SEC-2023-1424 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1424" }, { "category": "external", "summary": "Xerox Security Bulletin vom 2023-06-12", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/06/Xerox-Security-Bulletin-XRX23-009-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server f\u00fcr Solaris: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-12T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:30:41.322+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1424", "initial_release_date": "2023-06-12T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server v9 for Solaris", "product": { "name": "Xerox FreeFlow Print Server v9 for Solaris", "product_id": "T028053", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris" } } } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28708" }, { "cve": "CVE-2023-28176", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28176" }, { "cve": "CVE-2023-28164", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28164" }, { "cve": "CVE-2023-28163", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28163" }, { "cve": "CVE-2023-28162", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-28162" }, { "cve": "CVE-2023-27522", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-27522" }, { "cve": "CVE-2023-25752", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25752" }, { "cve": "CVE-2023-25751", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25751" }, { "cve": "CVE-2023-25746", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25746" }, { "cve": "CVE-2023-25744", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25744" }, { "cve": "CVE-2023-25743", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25743" }, { "cve": "CVE-2023-25742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25742" }, { "cve": "CVE-2023-25739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25739" }, { "cve": "CVE-2023-25738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25738" }, { "cve": "CVE-2023-25737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25737" }, { "cve": "CVE-2023-25735", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25735" }, { "cve": "CVE-2023-25734", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25734" }, { "cve": "CVE-2023-25732", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25732" }, { "cve": "CVE-2023-25730", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25730" }, { "cve": "CVE-2023-25729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25729" }, { "cve": "CVE-2023-25728", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25728" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-24807", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24807" }, { "cve": "CVE-2023-24580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-24580" }, { "cve": "CVE-2023-23969", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23969" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-23936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23936" }, { "cve": "CVE-2023-23920", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23920" }, { "cve": "CVE-2023-23919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23919" }, { "cve": "CVE-2023-23918", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23918" }, { "cve": "CVE-2023-23605", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23605" }, { "cve": "CVE-2023-23603", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23603" }, { "cve": "CVE-2023-23602", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23602" }, { "cve": "CVE-2023-23601", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23601" }, { "cve": "CVE-2023-23599", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23599" }, { "cve": "CVE-2023-23598", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-23598" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-22003", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-22003" }, { "cve": "CVE-2023-21985", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21985" }, { "cve": "CVE-2023-21984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21984" }, { "cve": "CVE-2023-21928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21928" }, { "cve": "CVE-2023-21896", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21896" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21840", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21840" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-0804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0804" }, { "cve": "CVE-2023-0803", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0803" }, { "cve": "CVE-2023-0802", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0802" }, { "cve": "CVE-2023-0801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0801" }, { "cve": "CVE-2023-0800", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0800" }, { "cve": "CVE-2023-0799", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0799" }, { "cve": "CVE-2023-0798", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0798" }, { "cve": "CVE-2023-0797", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0797" }, { "cve": "CVE-2023-0796", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0796" }, { "cve": "CVE-2023-0795", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0795" }, { "cve": "CVE-2023-0767", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0767" }, { "cve": "CVE-2023-0662", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0662" }, { "cve": "CVE-2023-0616", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0616" }, { "cve": "CVE-2023-0568", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0568" }, { "cve": "CVE-2023-0567", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0567" }, { "cve": "CVE-2023-0430", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0430" }, { "cve": "CVE-2023-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0417" }, { "cve": "CVE-2023-0416", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0416" }, { "cve": "CVE-2023-0415", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0415" }, { "cve": "CVE-2023-0414", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0414" }, { "cve": "CVE-2023-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0413" }, { "cve": "CVE-2023-0412", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0412" }, { "cve": "CVE-2023-0411", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0411" }, { "cve": "CVE-2023-0401", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0401" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0217" }, { "cve": "CVE-2023-0216", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0216" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-46877", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46877" }, { "cve": "CVE-2022-46874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46874" }, { "cve": "CVE-2022-46871", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46871" }, { "cve": "CVE-2022-46344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46344" }, { "cve": "CVE-2022-46343", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46343" }, { "cve": "CVE-2022-46342", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46342" }, { "cve": "CVE-2022-46341", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46341" }, { "cve": "CVE-2022-46340", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-46340" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-45199", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45199" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-4345", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4345" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42919", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42919" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4283", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4283" }, { "cve": "CVE-2022-4203", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-4203" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40898", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40898" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-39253", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-39253" }, { "cve": "CVE-2022-3924", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3924" }, { "cve": "CVE-2022-38784", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-38784" }, { "cve": "CVE-2022-38171", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-38171" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-3736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3736" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-36114", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36114" }, { "cve": "CVE-2022-36113", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-36113" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3256", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3256" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-3094", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3094" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-2929", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2929" }, { "cve": "CVE-2022-2928", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2928" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-28331", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28331" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27337", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-27337" }, { "cve": "CVE-2022-25255", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-25255" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-24963", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-24963" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-21515", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21515" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1122", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-1122" }, { "cve": "CVE-2022-0718", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2022-0718" }, { "cve": "CVE-2021-37750", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-37750" }, { "cve": "CVE-2021-37519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-37519" }, { "cve": "CVE-2021-35940", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-35940" }, { "cve": "CVE-2021-30860", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-30860" }, { "cve": "CVE-2021-29338", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2021-29338" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-12613", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2017-12613" }, { "cve": "CVE-2006-20001", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java, Apache und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T028053" ] }, "release_date": "2023-06-12T22:00:00Z", "title": "CVE-2006-20001" } ] }
WID-SEC-W-2022-1335
Vulnerability from csaf_certbund
Published
2022-09-07 22:00
Modified
2023-05-18 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1335 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json" }, { "category": "self", "summary": "WID-SEC-2022-1335 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-021 vom 2022-09-07", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:57:44.642+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1335", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2021-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-0561" }, { "cve": "CVE-2021-21708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-21708" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-30809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30897" }, { "cve": "CVE-2021-30934", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30934" }, { "cve": "CVE-2021-30936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30936" }, { "cve": "CVE-2021-30951", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30951" }, { "cve": "CVE-2021-30952", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30952" }, { "cve": "CVE-2021-30953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30953" }, { "cve": "CVE-2021-30954", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30954" }, { "cve": "CVE-2021-30984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30984" }, { "cve": "CVE-2021-3448", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-3448" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-4115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4115" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4217" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-45481", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45481" }, { "cve": "CVE-2021-45482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45482" }, { "cve": "CVE-2021-45483", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45483" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0156", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0156" }, { "cve": "CVE-2022-0158", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0158" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0408" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0417" }, { "cve": "CVE-2022-0443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0443" }, { "cve": "CVE-2022-0554", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0554" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0572" }, { "cve": "CVE-2022-0629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0629" }, { "cve": "CVE-2022-0685", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0685" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0714", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0714" }, { "cve": "CVE-2022-0729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0729" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1097" }, { "cve": "CVE-2022-1196", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1196" }, { "cve": "CVE-2022-1197", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1197" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1520", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1520" }, { "cve": "CVE-2022-1834", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1834" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21514", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21514" }, { "cve": "CVE-2022-21524", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21524" }, { "cve": "CVE-2022-21533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21533" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-22590", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22590" }, { "cve": "CVE-2022-22592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22592" }, { "cve": "CVE-2022-22620", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22620" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24130", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24130" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24713", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24713" }, { "cve": "CVE-2022-24801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24801" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25762" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26486" }, { "cve": "CVE-2022-28281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28281" }, { "cve": "CVE-2022-28282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28282" }, { "cve": "CVE-2022-28285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28285" }, { "cve": "CVE-2022-28286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28286" }, { "cve": "CVE-2022-28289", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28289" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28346", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28346" }, { "cve": "CVE-2022-28347", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28347" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-29909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29909" }, { "cve": "CVE-2022-29911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29911" }, { "cve": "CVE-2022-29912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29912" }, { "cve": "CVE-2022-29913", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29913" }, { "cve": "CVE-2022-29914", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29914" }, { "cve": "CVE-2022-29916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29916" }, { "cve": "CVE-2022-29917", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29917" }, { "cve": "CVE-2022-31736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31736" }, { "cve": "CVE-2022-31737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31737" }, { "cve": "CVE-2022-31738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31738" }, { "cve": "CVE-2022-31739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31739" }, { "cve": "CVE-2022-3174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-3174" }, { "cve": "CVE-2022-31740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31740" }, { "cve": "CVE-2022-31741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31741" }, { "cve": "CVE-2022-31742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31742" }, { "cve": "CVE-2022-31747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31747" }, { "cve": "CVE-2022-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-4187" } ] }
wid-sec-w-2023-1350
Vulnerability from csaf_certbund
Published
2023-06-01 22:00
Modified
2024-02-15 23:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen in Komponenten von Drittanbietern
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise in diversen Komponenten von Drittanbietern ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise in diversen Komponenten von Drittanbietern ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1350 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1350.json" }, { "category": "self", "summary": "WID-SEC-2023-1350 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1350" }, { "category": "external", "summary": "Splunk Enterprise Security Advisory SVD-2023-0613 vom 2023-06-01", "url": "https://advisory.splunk.com/advisories/SVD-2023-0613" }, { "category": "external", "summary": "IBM Security Bulletin 7008449 vom 2023-06-29", "url": "https://www.ibm.com/support/pages/node/7008449" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0487-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0486-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017932.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen in Komponenten von Drittanbietern", "tracking": { "current_release_date": "2024-02-15T23:00:00.000+00:00", "generator": { "date": "2024-02-16T09:06:57.360+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1350", "initial_release_date": "2023-06-01T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-15T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.1.14", "product": { "name": "Splunk Splunk Enterprise \u003c 8.1.14", "product_id": "T027935", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.1.14" } } }, { "category": "product_version_range", "name": "\u003c 8.2.11", "product": { "name": "Splunk Splunk Enterprise \u003c 8.2.11", "product_id": "T027936", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.11" } } }, { "category": "product_version_range", "name": "\u003c 9.0.5", "product": { "name": "Splunk Splunk Enterprise \u003c 9.0.5", "product_id": "T027937", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.5" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-4200", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4200" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-37616", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37616" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-25858", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-25858" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-33587", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33587" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-27292", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-27292" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-20095", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-20095" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8203" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8116", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8116" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-7753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7753" }, { "cve": "CVE-2020-7662", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7662" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-15138", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-15138" }, { "cve": "CVE-2020-13822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-13822" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-10746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10746" }, { "cve": "CVE-2019-10744", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10744" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-16042", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2017-16042" } ] }
WID-SEC-W-2023-2229
Vulnerability from csaf_certbund
Published
2023-08-30 22:00
Modified
2024-05-28 22:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuführen, einen 'Denial of Service'-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-28T22:00:00.000+00:00", "generator": { "date": "2024-05-29T08:07:49.870+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.1.1" } } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.6" } } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.12" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T002207", "T004914" ] }, "release_date": "2023-08-30T22:00:00Z", "title": "CVE-2023-40598" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
WID-SEC-W-2023-1350
Vulnerability from csaf_certbund
Published
2023-06-01 22:00
Modified
2024-02-15 23:00
Summary
Splunk Splunk Enterprise: Mehrere Schwachstellen in Komponenten von Drittanbietern
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Splunk Enterprise ermöglicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise in diversen Komponenten von Drittanbietern ausnutzen, um einen nicht näher spezifizierten Angriff durchzuführen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise in diversen Komponenten von Drittanbietern ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1350 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1350.json" }, { "category": "self", "summary": "WID-SEC-2023-1350 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1350" }, { "category": "external", "summary": "Splunk Enterprise Security Advisory SVD-2023-0613 vom 2023-06-01", "url": "https://advisory.splunk.com/advisories/SVD-2023-0613" }, { "category": "external", "summary": "IBM Security Bulletin 7008449 vom 2023-06-29", "url": "https://www.ibm.com/support/pages/node/7008449" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0487-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0486-1 vom 2024-02-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017932.html" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen in Komponenten von Drittanbietern", "tracking": { "current_release_date": "2024-02-15T23:00:00.000+00:00", "generator": { "date": "2024-02-16T09:06:57.360+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1350", "initial_release_date": "2023-06-01T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-01T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-06-29T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-02-15T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM DB2", "product": { "name": "IBM DB2", "product_id": "5104", "product_identification_helper": { "cpe": "cpe:/a:ibm:db2:-" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 8.1.14", "product": { "name": "Splunk Splunk Enterprise \u003c 8.1.14", "product_id": "T027935", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.1.14" } } }, { "category": "product_version_range", "name": "\u003c 8.2.11", "product": { "name": "Splunk Splunk Enterprise \u003c 8.2.11", "product_id": "T027936", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:8.2.11" } } }, { "category": "product_version_range", "name": "\u003c 9.0.5", "product": { "name": "Splunk Splunk Enterprise \u003c 9.0.5", "product_id": "T027937", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:9.0.5" } } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-46175" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-4200", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-4200" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-37616", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37616" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-25858", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-25858" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-33587", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33587" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33502", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-33502" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-27292", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-27292" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-23368", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23368" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-20095", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2021-20095" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8203", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8203" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8116", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-8116" }, { "cve": "CVE-2020-7774", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7774" }, { "cve": "CVE-2020-7753", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7753" }, { "cve": "CVE-2020-7662", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-7662" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-15138", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-15138" }, { "cve": "CVE-2020-13822", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2020-13822" }, { "cve": "CVE-2019-20149", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-20149" }, { "cve": "CVE-2019-10746", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10746" }, { "cve": "CVE-2019-10744", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2019-10744" }, { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2017-16042", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in Splunk Splunk Enterprise in zahlreichen Komponenten von Drittanbietern (OpenSSL, curl, go, zlib, SQLite, json und weitere), die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen." } ], "product_status": { "known_affected": [ "T002207", "5104" ] }, "release_date": "2023-06-01T22:00:00Z", "title": "CVE-2017-16042" } ] }
WID-SEC-W-2022-0515
Vulnerability from csaf_certbund
Published
2022-06-29 22:00
Modified
2023-06-08 22:00
Summary
IBM Spectrum Protect: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Spectrum Protect ist eine zentralisierte Backuplösung für Systeme im Netzwerk.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0515 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0515.json" }, { "category": "self", "summary": "WID-SEC-2022-0515 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0515" }, { "category": "external", "summary": "Ubuntu Security Notice USN-6151-1 vom 2023-06-09", "url": "https://ubuntu.com/security/notices/USN-6151-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-5984-1 vom 2023-03-29", "url": "https://www.cybersecurity-help.cz/vdb/SB2023032948" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596399" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596907" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596881" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596741" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596883" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596971" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596895" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596379" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596877" }, { "category": "external", "summary": "IBM Security Advisory vom 2022-06-29", "url": "https://www.ibm.com/support/pages/node/6596875" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-027 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-027.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2022-029 vom 2022-07-21", "url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-029.html" }, { "category": "external", "summary": "IBM Security Bulletin 6618019 vom 2022-09-03", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-information-disclosure-and-denial-of-service-vulnerabilities-in-the-ibm-spectrum-protect-backup-archive-client-may-affect-ibm-spectrum-protect-for-space-management-cve-2022-22478/" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-08T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:50:32.847+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0515", "initial_release_date": "2022-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2022-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-20T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-09-04T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-03-29T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2023-06-08T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect 8.1", "product": { "name": "IBM Spectrum Protect 8.1", "product_id": "T010033", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023649", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-25704", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-25704" }, { "cve": "CVE-2020-29368", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-29368" }, { "cve": "CVE-2020-36322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36322" }, { "cve": "CVE-2020-36385", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2020-36385" }, { "cve": "CVE-2021-20269", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20269" }, { "cve": "CVE-2021-20321", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20321" }, { "cve": "CVE-2021-20322", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-20322" }, { "cve": "CVE-2021-21781", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-21781" }, { "cve": "CVE-2021-28950", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28950" }, { "cve": "CVE-2021-28971", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-28971" }, { "cve": "CVE-2021-29650", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-29650" }, { "cve": "CVE-2021-31916", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-31916" }, { "cve": "CVE-2021-35550", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35550" }, { "cve": "CVE-2021-35603", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-35603" }, { "cve": "CVE-2021-3573", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3573" }, { "cve": "CVE-2021-3635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3635" }, { "cve": "CVE-2021-3669", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3669" }, { "cve": "CVE-2021-3764", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-3764" }, { "cve": "CVE-2021-38201", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38201" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-4002", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4002" }, { "cve": "CVE-2021-4028", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4028" }, { "cve": "CVE-2021-4083", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4083" }, { "cve": "CVE-2021-4154", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4154" }, { "cve": "CVE-2021-4155", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4155" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-41864", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-41864" }, { "cve": "CVE-2021-4197", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4197" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44733", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-44733" }, { "cve": "CVE-2021-45485", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45485" }, { "cve": "CVE-2021-45486", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2021-45486" }, { "cve": "CVE-2022-0185", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0286", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0286" }, { "cve": "CVE-2022-0492", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0492" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-0847", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0850", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-0850" }, { "cve": "CVE-2022-1011", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-1011" }, { "cve": "CVE-2022-22472", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22472" }, { "cve": "CVE-2022-22474", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22474" }, { "cve": "CVE-2022-22478", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22478" }, { "cve": "CVE-2022-22487", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22487" }, { "cve": "CVE-2022-22494", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22494" }, { "cve": "CVE-2022-22496", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22496" }, { "cve": "CVE-2022-22942", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-22942" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24842", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-24842" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten OpenSSL, Container Backup and Restore, Storage Agent, Client, Operations Center, Linux Kernel, MinIO , Golang Go, Java SE und in den Prozessen dsmcad, dsmc und dsmcsvc. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, seine Rechte zu erweitern oder beliebigen Code mit Root-Rechten auszuf\u00fchren. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T023649", "T000126", "T010033", "398363" ] }, "release_date": "2022-06-29T22:00:00Z", "title": "CVE-2022-28327" } ] }
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund
Published
2024-04-04 22:00
Modified
2024-04-04 22:00
Summary
Dell ECS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Dell ECS ist ein Objektspeichersystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-04T22:00:00.000+00:00", "generator": { "date": "2024-04-05T09:37:24.604+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 3.8.1.0", "product": { "name": "Dell ECS \u003c 3.8.1.0", "product_id": "T033919", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "release_date": "2024-04-04T22:00:00Z", "title": "CVE-2024-21626" } ] }
wid-sec-w-2022-1335
Vulnerability from csaf_certbund
Published
2022-09-07 22:00
Modified
2023-05-18 22:00
Summary
Xerox FreeFlow Print Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
FreeFlow-Druckserver ist eine Druckserveranwendung für Xerox-Produktionsdrucker, die Flexibilität, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verfügbarkeit und Integrität des Systems zu gefährden.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1335 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1335.json" }, { "category": "self", "summary": "WID-SEC-2022-1335 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1335" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-007 vom 2023-05-18", "url": "https://security.business.xerox.com/wp-content/uploads/2023/05/Xerox-Security-Bulletin-XRX23-007-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v7.pdf" }, { "category": "external", "summary": "XEROX Security Advisory XRX23-005 vom 2023-04-04", "url": "https://security.business.xerox.com/wp-content/uploads/2023/04/Xerox-Security-Bulletin-XRX23-005-Xerox%25C2%25AE-FreeFlow%25C2%25AE-Print-Server-v9.pdf" }, { "category": "external", "summary": "Xerox Security Bulletin XRX22-021 vom 2022-09-07", "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2022/09/Xerox-Security-Bulletin-XRX22-021-FreeFlow-Print-Server-v9.pdf" } ], "source_lang": "en-US", "title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T16:57:44.642+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1335", "initial_release_date": "2022-09-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-09-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-04-03T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von XEROX aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von XEROX aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Xerox FreeFlow Print Server 7", "product": { "name": "Xerox FreeFlow Print Server 7", "product_id": "T000872", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:7" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server 9", "product": { "name": "Xerox FreeFlow Print Server 9", "product_id": "T002977", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:9" } } }, { "category": "product_name", "name": "Xerox FreeFlow Print Server v9", "product": { "name": "Xerox FreeFlow Print Server v9", "product_id": "T015632", "product_identification_helper": { "cpe": "cpe:/a:xerox:freeflow_print_server:v9" } } } ], "category": "product_name", "name": "FreeFlow Print Server" } ], "category": "vendor", "name": "Xerox" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-25032", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2018-25032" }, { "cve": "CVE-2019-19906", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2019-19906" }, { "cve": "CVE-2020-0499", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-0499" }, { "cve": "CVE-2020-25717", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-25717" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2020-29651" }, { "cve": "CVE-2021-0561", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-0561" }, { "cve": "CVE-2021-21708", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-21708" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-25220", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-25220" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-30809", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30809" }, { "cve": "CVE-2021-30818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30818" }, { "cve": "CVE-2021-30823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30823" }, { "cve": "CVE-2021-30836", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30836" }, { "cve": "CVE-2021-30884", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30884" }, { "cve": "CVE-2021-30887", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30887" }, { "cve": "CVE-2021-30888", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30888" }, { "cve": "CVE-2021-30889", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30889" }, { "cve": "CVE-2021-30890", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30890" }, { "cve": "CVE-2021-30897", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30897" }, { "cve": "CVE-2021-30934", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30934" }, { "cve": "CVE-2021-30936", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30936" }, { "cve": "CVE-2021-30951", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30951" }, { "cve": "CVE-2021-30952", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30952" }, { "cve": "CVE-2021-30953", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30953" }, { "cve": "CVE-2021-30954", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30954" }, { "cve": "CVE-2021-30984", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-30984" }, { "cve": "CVE-2021-3448", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-3448" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-4115", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4115" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4217", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-4217" }, { "cve": "CVE-2021-43519", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43519" }, { "cve": "CVE-2021-43566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-43566" }, { "cve": "CVE-2021-44142", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-44142" }, { "cve": "CVE-2021-45444", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45444" }, { "cve": "CVE-2021-45481", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45481" }, { "cve": "CVE-2021-45482", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45482" }, { "cve": "CVE-2021-45483", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45483" }, { "cve": "CVE-2021-45960", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-45960" }, { "cve": "CVE-2021-46143", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2021-46143" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0156", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0156" }, { "cve": "CVE-2022-0158", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0158" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0336", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0336" }, { "cve": "CVE-2022-0391", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0391" }, { "cve": "CVE-2022-0408", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0408" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0417", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0417" }, { "cve": "CVE-2022-0443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0443" }, { "cve": "CVE-2022-0554", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0554" }, { "cve": "CVE-2022-0566", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0566" }, { "cve": "CVE-2022-0572", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0572" }, { "cve": "CVE-2022-0629", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0629" }, { "cve": "CVE-2022-0685", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0685" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0714", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0714" }, { "cve": "CVE-2022-0729", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0729" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1097", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1097" }, { "cve": "CVE-2022-1196", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1196" }, { "cve": "CVE-2022-1197", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1197" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1520", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1520" }, { "cve": "CVE-2022-1834", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-1834" }, { "cve": "CVE-2022-21245", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21245" }, { "cve": "CVE-2022-21270", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21270" }, { "cve": "CVE-2022-21291", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21291" }, { "cve": "CVE-2022-21303", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21303" }, { "cve": "CVE-2022-21304", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21304" }, { "cve": "CVE-2022-21344", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21344" }, { "cve": "CVE-2022-21349", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21349" }, { "cve": "CVE-2022-21367", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21367" }, { "cve": "CVE-2022-21426", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21426" }, { "cve": "CVE-2022-21434", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21434" }, { "cve": "CVE-2022-21443", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21443" }, { "cve": "CVE-2022-21449", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21449" }, { "cve": "CVE-2022-21476", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21476" }, { "cve": "CVE-2022-21493", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21493" }, { "cve": "CVE-2022-21494", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21494" }, { "cve": "CVE-2022-21496", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21496" }, { "cve": "CVE-2022-21514", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21514" }, { "cve": "CVE-2022-21524", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21524" }, { "cve": "CVE-2022-21533", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21533" }, { "cve": "CVE-2022-21712", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21712" }, { "cve": "CVE-2022-21716", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-21716" }, { "cve": "CVE-2022-22589", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22589" }, { "cve": "CVE-2022-22590", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22590" }, { "cve": "CVE-2022-22592", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22592" }, { "cve": "CVE-2022-22620", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22620" }, { "cve": "CVE-2022-22719", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22719" }, { "cve": "CVE-2022-22720", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22720" }, { "cve": "CVE-2022-22721", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22721" }, { "cve": "CVE-2022-22818", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22818" }, { "cve": "CVE-2022-22822", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22822" }, { "cve": "CVE-2022-22823", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22823" }, { "cve": "CVE-2022-22824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22824" }, { "cve": "CVE-2022-22825", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22825" }, { "cve": "CVE-2022-22826", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22826" }, { "cve": "CVE-2022-22827", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-22827" }, { "cve": "CVE-2022-23308", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23308" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-23833", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23833" }, { "cve": "CVE-2022-23852", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23852" }, { "cve": "CVE-2022-23943", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23943" }, { "cve": "CVE-2022-23990", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-23990" }, { "cve": "CVE-2022-24130", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24130" }, { "cve": "CVE-2022-24407", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24407" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24713", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24713" }, { "cve": "CVE-2022-24801", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-24801" }, { "cve": "CVE-2022-25235", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25235" }, { "cve": "CVE-2022-25236", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25236" }, { "cve": "CVE-2022-25313", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25313" }, { "cve": "CVE-2022-25314", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25314" }, { "cve": "CVE-2022-25315", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25315" }, { "cve": "CVE-2022-25762", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-25762" }, { "cve": "CVE-2022-26381", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26381" }, { "cve": "CVE-2022-26383", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26383" }, { "cve": "CVE-2022-26384", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26384" }, { "cve": "CVE-2022-26386", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26386" }, { "cve": "CVE-2022-26387", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26387" }, { "cve": "CVE-2022-26485", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26485" }, { "cve": "CVE-2022-26486", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-26486" }, { "cve": "CVE-2022-28281", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28281" }, { "cve": "CVE-2022-28282", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28282" }, { "cve": "CVE-2022-28285", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28285" }, { "cve": "CVE-2022-28286", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28286" }, { "cve": "CVE-2022-28289", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28289" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-28346", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28346" }, { "cve": "CVE-2022-28347", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-28347" }, { "cve": "CVE-2022-29824", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29824" }, { "cve": "CVE-2022-29909", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29909" }, { "cve": "CVE-2022-29911", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29911" }, { "cve": "CVE-2022-29912", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29912" }, { "cve": "CVE-2022-29913", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29913" }, { "cve": "CVE-2022-29914", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29914" }, { "cve": "CVE-2022-29916", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29916" }, { "cve": "CVE-2022-29917", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-29917" }, { "cve": "CVE-2022-31736", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31736" }, { "cve": "CVE-2022-31737", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31737" }, { "cve": "CVE-2022-31738", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31738" }, { "cve": "CVE-2022-31739", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31739" }, { "cve": "CVE-2022-3174", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-3174" }, { "cve": "CVE-2022-31740", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31740" }, { "cve": "CVE-2022-31741", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31741" }, { "cve": "CVE-2022-31742", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31742" }, { "cve": "CVE-2022-31747", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-31747" }, { "cve": "CVE-2022-4187", "notes": [ { "category": "description", "text": "In Xerox FreeFlow Print Server existieren mehrere Schwachstellen im Zusammenhang mit bekannten Java und Mozilla Firefox Schwachstellen. Ein Angreifer kann diese ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden." } ], "product_status": { "known_affected": [ "T000872", "T015632", "T002977" ] }, "release_date": "2022-09-07T22:00:00Z", "title": "CVE-2022-4187" } ] }
gsd-2022-28327
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-28327", "description": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.", "id": "GSD-2022-28327", "references": [ "https://www.suse.com/security/cve/CVE-2022-28327.html", "https://advisories.mageia.org/CVE-2022-28327.html", "https://linux.oracle.com/cve/CVE-2022-28327.html", "https://access.redhat.com/errata/RHSA-2022:5006", "https://access.redhat.com/errata/RHSA-2022:5337", "https://access.redhat.com/errata/RHSA-2022:5415", "https://access.redhat.com/errata/RHSA-2022:5068", "https://access.redhat.com/errata/RHSA-2022:5840", "https://access.redhat.com/errata/RHSA-2022:5875", "https://access.redhat.com/errata/RHSA-2022:6040", "https://access.redhat.com/errata/RHSA-2022:6042", "https://access.redhat.com/errata/RHSA-2022:5729", "https://access.redhat.com/errata/RHSA-2022:6094", "https://access.redhat.com/errata/RHSA-2022:6155", "https://access.redhat.com/errata/RHSA-2022:6156", "https://access.redhat.com/errata/RHSA-2022:6187", "https://access.redhat.com/errata/RHSA-2022:6277", "https://access.redhat.com/errata/RHSA-2022:6152", "https://access.redhat.com/errata/RHSA-2022:6290", "https://alas.aws.amazon.com/cve/html/CVE-2022-28327.html", "https://access.redhat.com/errata/RHSA-2022:5799", "https://access.redhat.com/errata/RHSA-2022:6526", "https://access.redhat.com/errata/RHSA-2022:6714", "https://access.redhat.com/errata/RHSA-2022:8750", "https://access.redhat.com/errata/RHSA-2023:1042" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-28327" ], "details": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.", "id": "GSD-2022-28327", "modified": "2023-12-13T01:19:34.424795Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-28327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce" }, { "name": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "refsource": "CONFIRM", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" }, { "name": "FEDORA-2022-a49babed75", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/" }, { "name": "FEDORA-2022-53f0c619c5", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NY6GEAJMNKKMU5H46QO4D7D6A24KSPXE/" }, { "name": "FEDORA-2022-c0f780ecf1", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/" }, { "name": "FEDORA-2022-e46e6e8317", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/" }, { "name": "FEDORA-2022-fae3ecee19", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/" }, { "name": "FEDORA-2022-ba365d3703", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "FEDORA-2022-30c5ed5625", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/" }, { "name": "https://security.netapp.com/advisory/ntap-20220915-0010/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220915-0010/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf", "refsource": "MISC", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.18.1", "versionStartIncluding": "1.18.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.17.9", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-28327" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://groups.google.com/g/golang-announce", "refsource": "MISC", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://groups.google.com/g/golang-announce" }, { "name": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "refsource": "CONFIRM", "tags": [ "Mailing List", "Release Notes", "Vendor Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" }, { "name": "FEDORA-2022-53f0c619c5", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NY6GEAJMNKKMU5H46QO4D7D6A24KSPXE/" }, { "name": "FEDORA-2022-a49babed75", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM/" }, { "name": "FEDORA-2022-c0f780ecf1", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY/" }, { "name": "FEDORA-2022-e46e6e8317", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP/" }, { "name": "FEDORA-2022-fae3ecee19", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR/" }, { "name": "FEDORA-2022-ba365d3703", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5/" }, { "name": "GLSA-202208-02", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "name": "FEDORA-2022-30c5ed5625", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6/" }, { "name": "https://security.netapp.com/advisory/ntap-20220915-0010/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220915-0010/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf", "refsource": "MISC", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-02-14T12:15Z", "publishedDate": "2022-04-20T10:15Z" } } }
ghsa-v5qw-m6mv-3q79
Vulnerability from github
Published
2022-04-21 00:00
Modified
2022-05-01 00:00
Severity ?
Details
The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.
{ "affected": [], "aliases": [ "CVE-2022-28327" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-04-20T10:15:00Z", "severity": "HIGH" }, "details": "The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.", "id": "GHSA-v5qw-m6mv-3q79", "modified": "2022-05-01T00:00:38Z", "published": "2022-04-21T00:00:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-744259.pdf" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TYZC4OAY54TO75FBEFAPV5G7O4D5TM" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3BMW5QGX53CMIJIZWKXFKBJX2C5GWTY" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NY6GEAJMNKKMU5H46QO4D7D6A24KSPXE" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RCRSABD6CUDIZULZPZL5BJ3ET3A2NEJP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RQXU752ALW53OJAF5MG3WMR5CCZVLWW6" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z55VUVGO7E5PJFXIOVAY373NZRHBNCI5" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZY2SLWOQR4ZURQ7UBRZ7JIX6H6F5JHJR" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202208-02" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20220915-0010" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.